<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Technology &#8211; tekRESCUE</title>
	<atom:link href="/category/it/feed/" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>SEO &#38; Managed IT Solutions for Austin, San Marcos &#38; Central Texas</description>
	<lastBuildDate>Thu, 30 Jun 2022 17:07:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.1</generator>

<image>
	<url>/wp-content/uploads/2020/09/tekrescue-site-icon_512-84x84.png</url>
	<title>Articles about Information Technology (IT)  - tekRESCUE</title>
	<link>/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity Policies to Consider Implementing for Remote Employees</title>
		<link>/cybersecurity-policies-to-consider-implementing-for-remote-employees/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cybersecurity-policies-to-consider-implementing-for-remote-employees</link>
		
		<dc:creator><![CDATA[Breanna Graves]]></dc:creator>
		<pubDate>Thu, 30 Jun 2022 17:06:54 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<guid isPermaLink="false">/?p=20260</guid>

					<description><![CDATA[<a href="/cybersecurity-policies-to-consider-implementing-for-remote-employees/" title="Cybersecurity Policies to Consider Implementing for Remote Employees" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2022/06/working-from-home.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="working from home" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2022/06/working-from-home.jpg 900w, /wp-content/uploads/2022/06/working-from-home-600x400.jpg 600w, /wp-content/uploads/2022/06/working-from-home-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>Cybersecurity is the practice of maintaining control over computer systems and data integrity while minimizing the risk of unauthorized access or damage through malicious attacks. A cybersecurity policy defines a set of security practices used by employees, contractors, partners, users, and third parties interacting with your organization&#8217;s network(s). The goal of a well-written cyber policy...]]></description>
										<content:encoded><![CDATA[<a href="/cybersecurity-policies-to-consider-implementing-for-remote-employees/" title="Cybersecurity Policies to Consider Implementing for Remote Employees" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2022/06/working-from-home.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="working from home" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2022/06/working-from-home.jpg 900w, /wp-content/uploads/2022/06/working-from-home-600x400.jpg 600w, /wp-content/uploads/2022/06/working-from-home-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p>Cybersecurity is the practice of maintaining control over computer systems and data integrity while minimizing the risk of unauthorized access or damage through malicious attacks. A cybersecurity policy defines a set of security practices used by employees, contractors, partners, users, and third parties interacting with your organization&#8217;s network(s). The goal of a well-written cyber policy should be simple. Ensure you are keeping up with current best practices so as not to put your business at risk due to outdated policies unintentionally. The following are cybersecurity policies to consider implementing for remote employees.</p>



<h2>Access Control Policy</h2>



<p>Your company may have an existing access control policy that includes guidelines on who can enter specific areas of your network where sensitive information or assets reside. In general, if you do not limit entry based on precise job functions and responsibilities, it will be difficult for management to ensure that only the desired people are accessing certain areas of your network when necessary for their job function. Your access control policy must also address how often individuals can change their passwords, which services they can use to connect to your networks, what types of devices they can use to connect to the Internet, and whether your staff can get online from home computers or mobile devices, and much more.</p>



<h2>Administrator Rights Policy</h2>



<p>This policy addresses administrators&#8217; rights and privileges to manage a network. A good administrator rights policy outlines what administrators can and cannot do on the network, including installing software, configuring network settings, backing up files or databases, performing backups, etc. An example of a lousy admin rights policy would let anyone add new accounts or modify user accounts without first getting approval. A good policy might require all changes to be approved. Make sure you understand the implications of this policy before you roll out any updates or changes.</p>



<h2>Audit Log Policy</h2>



<p>If you allow employees to connect to your network via public WiFi hotspots like coffee shops, airports, or hotels, consider setting up a policy that requires them to log into each site beforehand. Otherwise, they may leave valuable files, such as credit card numbers, customer or vendor records, bank statements, or personally identifiable information, publicly available because they connected through a wireless connection. Some companies even go further than requiring people to log in to a VPN, requiring them to identify themselves using their valid work email address and password before accessing anything work related.</p>



<h2>Data Loss Prevention Policy</h2>



<p>DLP is a technology that monitors file transfers and automatically blocks certain types of content from being transferred between different locations within your network (for instance, blocking malware attachments). It&#8217;s important to note that this policy does not prevent employees from transferring sensitive data outside of the company but instead prevents the transfer of potentially illegal or harmful files inside the firewall. Any time someone needs to send sensitive data outside of the firewall, they should obtain explicit permission from IT.</p>



<h2>Data Security Policy</h2>



<p>All of your employee&#8217;s data belongs to them but ultimately it belongs to the company too, so ensure you give them adequate privacy options to protect that data. You can implement policies regarding when and how frequently they can access their Gmail account, calendar, contacts, voicemail, and other electronic communications tools; whether they can back up their data remotely; what operating systems and applications their device(s) can utilize; and more. Giving your employee secure tools to utilize to store and manage their data can be a great start to ensuring they are more secure when working from home. </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Different Ways to Protect Your Eyes from Blue Light</title>
		<link>/different-ways-to-protect-your-eyes-from-blue-light/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=different-ways-to-protect-your-eyes-from-blue-light</link>
		
		<dc:creator><![CDATA[Breanna Graves]]></dc:creator>
		<pubDate>Thu, 12 May 2022 22:20:52 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<guid isPermaLink="false">/?p=19845</guid>

					<description><![CDATA[<a href="/different-ways-to-protect-your-eyes-from-blue-light/" title="Different Ways to Protect Your Eyes from Blue Light" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2022/05/blue-light.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="person working on computer being exposed to blue light" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2022/05/blue-light.jpg 900w, /wp-content/uploads/2022/05/blue-light-600x400.jpg 600w, /wp-content/uploads/2022/05/blue-light-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>The blue light eye injury is no mere coincidence. You may be at risk of blue light eye injury if you spend several hours on your computer. Your computer screen naturally emits blue lights. And if you stare at it for too long, it will hurt your eyes. In addition, light is thought to cause...]]></description>
										<content:encoded><![CDATA[<a href="/different-ways-to-protect-your-eyes-from-blue-light/" title="Different Ways to Protect Your Eyes from Blue Light" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2022/05/blue-light.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="person working on computer being exposed to blue light" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2022/05/blue-light.jpg 900w, /wp-content/uploads/2022/05/blue-light-600x400.jpg 600w, /wp-content/uploads/2022/05/blue-light-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p>The blue light eye injury is no mere coincidence. You may be at risk of blue light eye injury if you spend several hours on your computer. Your computer screen naturally emits blue lights. And if you stare at it for too long, it will hurt your eyes. In addition, light is thought to cause sleeplessness. Other harmful effects of blue light on the eyes may exist, although eye injury is the most common.</p>



<h2>What is Blue Light?</h2>



<p>Visible light is created by combining several wavelengths. Blue light is the most energetic component of the light spectrum. As a result, it can rapidly pierce the retina towards the back of the eyes. Unfortunately, unlike other hazardous wavelengths, blue light cannot be stopped by other elements of the eyes, such as the lens and cornea.</p>



<h2>How to Protect Eyes from Blue Light</h2>



<p>There are several technologies available that will filter Blue Light for you. We&#8217;ll guide you through the five major techniques to filter blue light and discuss the benefits and drawbacks of each approach.</p>



<h3>1. Make use of Flux Software</h3>



<p>Flux is a fantastic tool for protecting your eyes from blue light while working on your laptop or desktop PC. Flux filters your computer screen to make it cooler, warmer, and more attractive. Blue light is blocked by the filters, which protect your eyes from further harm. The Flux app may be a better alternative if you don&#8217;t want to strain, have a lengthy headache, or sleep poorly. Furthermore, the software is simple, handy, and effective, allowing you to enjoy working on your computer.</p>



<h3>2. Wear Eyeglasses with the Correct Prescription</h3>



<p>Squinting at screens for long periods is harmful to your eyes. If you wear glasses to correct your vision, be sure the prescription is for a distance of at least an arm&#8217;s length between your eyes and the screen. The majority of glasses are made for longer distances. Consider talking to an expert for advice on which glasses are suitable for looking at screens for long periods of time.</p>



<h3>3. Change the screen settings</h3>



<p>If your screen appears dull or too bright, adjust the brightness to match the ambient light. A greater brightness level indicates that your computer or smartphone screen emits more blue light. The blue light filter option is becoming more common on computer screens. If this is accessible, make sure to enable it.</p>



<h3>4. Lighting the Room</h3>



<p>The brightness of your room&#8217;s lighting must match the brightness of your screen. When operating electronic devices, strive for a consistent brightness level since low ambient light tricks your eyes into allowing in more blue light. Do not adjust your computer screen&#8217;s lighting from the normal level whatsoever. Instead, ensure your room is properly lit.</p>



<h3>5. Let Your Eyes Rest</h3>



<p>How can you avoid digital blue light overexposure? One simple method is to follow the 20-20-20 rule. Every 20 minutes, take a 20-minute break from your computer and gaze at anything 20 feet away for at least 20 seconds. This method can reduce eye strain while also being a regular reminder to limit your exposure to blue light.</p>



<h2>Conclusion</h2>



<p>Excessive blue light exposure can lead to digital eye strain (computer vision syndrome) and retinal cell damage (which can increase the risk for issues like macular degeneration). There are, however, a few things that can help lessen the risk of problems, such as the ones discussed above.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>It’s Time to Vote for Best of Hays 2021!</title>
		<link>/its-time-to-vote-for-best-of-hays-2021/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=its-time-to-vote-for-best-of-hays-2021</link>
		
		<dc:creator><![CDATA[Drew Harrison]]></dc:creator>
		<pubDate>Mon, 07 Mar 2022 19:39:40 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[best of hays]]></category>
		<guid isPermaLink="false">/?p=18892</guid>

					<description><![CDATA[<a href="/its-time-to-vote-for-best-of-hays-2021/" title="It’s Time to Vote for Best of Hays 2021!" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2022/03/vote-boh-2021_900x600.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Hand submitting a voting ballot with the San Marcos Daily Record Best of Hays 2021 logo" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2022/03/vote-boh-2021_900x600.jpg 900w, /wp-content/uploads/2022/03/vote-boh-2021_900x600-600x400.jpg 600w, /wp-content/uploads/2022/03/vote-boh-2021_900x600-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>tekRESCUE Best of Hays Nominations Below are the categories tekRESCUE has been nominated for in Best of Hays 2021. To vote, simply follow the links and select “Vote” for your candidate of choice. You will be prompted to log in with a valid email. BEST TECH SUPPORT BEST COMPUTER REPAIR Haven’t voted in Best of...]]></description>
										<content:encoded><![CDATA[<a href="/its-time-to-vote-for-best-of-hays-2021/" title="It’s Time to Vote for Best of Hays 2021!" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2022/03/vote-boh-2021_900x600.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Hand submitting a voting ballot with the San Marcos Daily Record Best of Hays 2021 logo" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2022/03/vote-boh-2021_900x600.jpg 900w, /wp-content/uploads/2022/03/vote-boh-2021_900x600-600x400.jpg 600w, /wp-content/uploads/2022/03/vote-boh-2021_900x600-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<div class="wp-block-media-text alignwide is-stacked-on-mobile is-vertically-aligned-center is-image-fill"><figure class="wp-block-media-text__media" style="background-image:url(/wp-content/uploads/2022/03/Best-of-hays-2021-sq-take3.png);background-position:50% 50%"><img loading="lazy" width="890" height="890" title="Best of hays 2021 sq take3" src="/wp-content/uploads/2022/03/Best-of-hays-2021-sq-take3.png" alt="Best of Hays 2021 Logo" class="wp-image-18904 size-full" srcset="/wp-content/uploads/2022/03/Best-of-hays-2021-sq-take3.png 890w, /wp-content/uploads/2022/03/Best-of-hays-2021-sq-take3-250x250.png 250w, /wp-content/uploads/2022/03/Best-of-hays-2021-sq-take3-84x84.png 84w, /wp-content/uploads/2022/03/Best-of-hays-2021-sq-take3-400x400.png 400w" sizes="(max-width: 890px) 100vw, 890px" /></figure><div class="wp-block-media-text__content">
<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<p class="has-drop-cap">tekRESCUE has been nominated for two separate Best of Hays awards this year, and your votes will help decide who wins. Curious what we’ve been nominated for and how you can help determine the final Best of Hays 2021 winners? Just keep reading!</p>
</div></div>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h2><strong>tekRESCUE Best of Hays Nominations</strong></h2>



<p>Below are the categories tekRESCUE has been nominated for in Best of Hays 2021. To vote, simply follow the links and select “Vote” for your candidate of choice. You will be prompted to log in with a valid email.</p>



<div class="wp-container-7 wp-block-columns are-vertically-aligned-bottom">
<div class="wp-container-3 wp-block-column is-vertically-aligned-bottom" style="flex-basis:16.33%"></div>



<div class="wp-container-4 wp-block-column is-vertically-aligned-bottom" style="flex-basis:33.33%">
<figure class="wp-block-image size-full"><img loading="lazy" width="450" height="354" title="illustration face anybg" src="/wp-content/uploads/2018/01/illustration_face_anybg.png" alt="Illustration of a face on a computer monitor" class="wp-image-7695" srcset="/wp-content/uploads/2018/01/illustration_face_anybg.png 450w, /wp-content/uploads/2018/01/illustration_face_anybg-20x16.png 20w" sizes="(max-width: 450px) 100vw, 450px" /></figure>



<h3 class="has-text-align-center">BEST TECH SUPPORT</h3>



<div style="height:50px" aria-hidden="true" class="wp-block-spacer"></div>
</div>



<div class="wp-container-5 wp-block-column is-vertically-aligned-bottom" style="flex-basis:33.33%">
<figure class="wp-block-image size-full"><img loading="lazy" width="658" height="479" title="illustration free diagnosis any bg" src="/wp-content/uploads/2018/01/illustration_free-diagnosis_any-bg.png" alt="illustration of a stethoscope checking up on a computer" class="wp-image-7741" srcset="/wp-content/uploads/2018/01/illustration_free-diagnosis_any-bg.png 658w, /wp-content/uploads/2018/01/illustration_free-diagnosis_any-bg-600x437.png 600w, /wp-content/uploads/2018/01/illustration_free-diagnosis_any-bg-20x15.png 20w" sizes="(max-width: 658px) 100vw, 658px" /></figure>



<h3 class="has-text-align-center">BEST COMPUTER REPAIR</h3>



<div style="height:50px" aria-hidden="true" class="wp-block-spacer"></div>
</div>



<div class="wp-container-6 wp-block-column is-vertically-aligned-bottom" style="flex-basis:17%"></div>
</div>



<div style="height:25px" aria-hidden="true" class="wp-block-spacer"></div>



<h2>Haven’t voted in Best of Hays before? Here’s what it’s all about</h2>



<p>Every year the citizens of <a rel="noreferrer noopener nofollow" aria-label=" (opens in a new tab)" href="https://goo.gl/maps/o89C9xWwPNbVGpmm9" target="_blank">Hays County</a>, Texas vote to choose the best businesses in a variety of categories for the previous year (in other words, the businesses you’re voting for in 2022 will be receiving awards for their performance in 2021). </p>



<p>The contest is administered by the local newspaper, the <a href="https://www.sanmarcosrecord.com/" target="_blank" rel="noreferrer noopener nofollow" aria-label=" (opens in a new tab)">San Marcos Daily Record</a>. Voting has historically taken place by newspaper ballot, but this year the contest has gone digital. If you’re concerned about being able to access Best of Hays online, your <a href="https://www.sanmarcostx.gov/586/Library" target="_blank" rel="noreferrer noopener nofollow" aria-label=" (opens in a new tab)">San Marcos Public Library</a> has guest computers available for use daily. </p>



<p>This year, nominations for Best of Hays took place early in February. After nominations closed, the top three businesses in each category were determined. Voting to determine the final winner in each category will take until the March 11th at midnight, after which the final tally will be determined by the San Marcos Daily Record. </p>



<blockquote class="wp-block-quote"><p>Be a part of the results and vote!</p></blockquote>



<h2>Who is tekRESCUE?</h2>



<p>tekRESCUE is a web developer and IT service provider based in <a href="https://goo.gl/maps/g3spYge8jwCQThqU6" target="_blank" rel="nofollow">San Marcos, Texas</a>. We have been serving the hill country and beyond for nearly a decade. Our team is proud to provide the best IT, digital marketing, and web design services possible to clients across a wide variety of different specialties. </p>



<p>Interested in learning more about our services? </p>



<div class="wp-block-media-text alignwide is-stacked-on-mobile is-image-fill has-background has-content-bg-alt-background-color has-background"><figure class="wp-block-media-text__media" style="background-image:url(/wp-content/uploads/2019/10/cyber-security.jpg);background-position:50% 50%"><img loading="lazy" width="900" height="600" title="cyber security" src="/wp-content/uploads/2019/10/cyber-security.jpg" alt="Man working on cyber security for a San Marcos web design company" class="wp-image-12521 size-full" srcset="/wp-content/uploads/2019/10/cyber-security.jpg 900w, /wp-content/uploads/2019/10/cyber-security-600x400.jpg 600w, /wp-content/uploads/2019/10/cyber-security-300x200.jpg 300w, /wp-content/uploads/2019/10/cyber-security-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></figure><div class="wp-block-media-text__content">
<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3>Managed IT Services</h3>



<p class="has-normal-font-size">To keep your business running smoothly, your technology needs to be  secure and up-to-date. tekRESCUE offers IT service options for  businesses of all sizes. We keep your devices safe and running smoothly  so you can concentrate on your customers. </p>



<div class="wp-block-button"><a class="wp-block-button__link" href="/managed-it-services-austin-san-marcos-texas/"><strong>LEARN MORE</strong></a></div>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>
</div></div>



<div style="height:25px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-media-text alignwide is-stacked-on-mobile is-image-fill has-background has-content-bg-alt-background-color has-background"><figure class="wp-block-media-text__media" style="background-image:url(/wp-content/uploads/2017/08/tr-portfolio_127group.jpg);background-position:50% 50%"><img loading="lazy" width="1280" height="854" title="tr portfolio 127group" src="/wp-content/uploads/2017/08/tr-portfolio_127group.jpg" alt="Two people in a meeting with the 127 Group site pulled up on a tablet" class="wp-image-7108 size-full" srcset="/wp-content/uploads/2017/08/tr-portfolio_127group.jpg 1280w, /wp-content/uploads/2017/08/tr-portfolio_127group-1100x734.jpg 1100w, /wp-content/uploads/2017/08/tr-portfolio_127group-600x400.jpg 600w, /wp-content/uploads/2017/08/tr-portfolio_127group-300x200.jpg 300w, /wp-content/uploads/2017/08/tr-portfolio_127group-1200x801.jpg 1200w, /wp-content/uploads/2017/08/tr-portfolio_127group-768x512.jpg 768w" sizes="(max-width: 1280px) 100vw, 1280px" /></figure><div class="wp-block-media-text__content">
<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3>Website Design &amp; Development</h3>



<p>Whether you need web hosting, a website redesign, or a whole new website built from the ground up, tekRESCUE is here to help. Our expert designers have built countless sites for a variety of business, all made to fit your brand and perform well in today’s online market.</p>



<div class="wp-block-button"><a class="wp-block-button__link" href="/our-portfolio/"><strong>SEE PORTFOLIO</strong></a></div>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>
</div></div>



<div style="height:25px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-media-text alignwide is-stacked-on-mobile is-image-fill has-background has-content-bg-alt-background-color has-background"><figure class="wp-block-media-text__media" style="background-image:url(/wp-content/uploads/2016/11/digital-marketing-1725340_1280.jpg);background-position:55.00000000000001% 50%"><img loading="lazy" width="1280" height="853" title="digital marketing 1725340 1280" src="/wp-content/uploads/2016/11/digital-marketing-1725340_1280.jpg" alt="3 Things To Do Daily to Boost SEO In Less Than 30 Minutes" class="wp-image-6482 size-full" srcset="/wp-content/uploads/2016/11/digital-marketing-1725340_1280.jpg 1280w, /wp-content/uploads/2016/11/digital-marketing-1725340_1280-1100x733.jpg 1100w, /wp-content/uploads/2016/11/digital-marketing-1725340_1280-600x400.jpg 600w, /wp-content/uploads/2016/11/digital-marketing-1725340_1280-300x200.jpg 300w, /wp-content/uploads/2016/11/digital-marketing-1725340_1280-1200x800.jpg 1200w" sizes="(max-width: 1280px) 100vw, 1280px" /></figure><div class="wp-block-media-text__content">
<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>



<h3>Digital Marketing </h3>



<p>Our experienced team is available to help with a wide range of digital marketing campaigns. From search engine optimization (SEO) and social media management (SMM) to geofenced ad campaigns, we’re here to make sure your brand gets seen in online.</p>



<div class="wp-block-button"><a class="wp-block-button__link" href="/category/smm/"><strong>LEARN MORE</strong></a></div>



<div style="height:20px" aria-hidden="true" class="wp-block-spacer"></div>
</div></div>



<div style="height:25px" aria-hidden="true" class="wp-block-spacer"></div>



<p>Need more information about how technology services can benefit your business? Contact tekRESCUE to speak to a professional who can help!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why Community Outreach is Important for SEO</title>
		<link>/why-community-outreach-is-important-for-seo/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-community-outreach-is-important-for-seo</link>
		
		<dc:creator><![CDATA[Breanna Graves]]></dc:creator>
		<pubDate>Tue, 01 Mar 2022 16:06:27 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<guid isPermaLink="false">/?p=18741</guid>

					<description><![CDATA[<a href="/why-community-outreach-is-important-for-seo/" title="Why Community Outreach is Important for SEO" rel="nofollow"><img width="600" height="400" src="/wp-content/uploads/2022/03/seo-scrabble-1.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="SEO companies in Austin Tx that can provide search engine optimization services for your company" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2022/03/seo-scrabble-1.jpg 600w, /wp-content/uploads/2022/03/seo-scrabble-1-300x200.jpg 300w" sizes="(max-width: 600px) 100vw, 600px" /></a>Search engine optimization is a significant factor in the success of any online business. If your website is not well optimized for search engines, it will be challenging to get the desired traffic. SEO&#8217;s first and foremost objective is to get more traffic to the website. Community outreach is an excellent way to achieve this...]]></description>
										<content:encoded><![CDATA[<a href="/why-community-outreach-is-important-for-seo/" title="Why Community Outreach is Important for SEO" rel="nofollow"><img width="600" height="400" src="/wp-content/uploads/2022/03/seo-scrabble-1.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="SEO companies in Austin Tx that can provide search engine optimization services for your company" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2022/03/seo-scrabble-1.jpg 600w, /wp-content/uploads/2022/03/seo-scrabble-1-300x200.jpg 300w" sizes="(max-width: 600px) 100vw, 600px" /></a>
<p>Search engine optimization is a significant factor in the success of any online business. If your website is not well optimized for search engines, it will be challenging to get the desired traffic. SEO&#8217;s first and foremost objective is to get more traffic to the website. Community outreach is an excellent way to achieve this objective and increase your brand visibility. Most companies that are marketing to an online customer base believe that SEO helps them acquire more traffic.</p>



<h2>What is SEO Outreach</h2>



<p>The term &#8220;SEO outreach&#8221; is used for the process of getting your website &#8220;link&#8221; published on websites that are highly trafficked. This is done to ensure that the SEO effort that your company has made is magnified. This is done, for example, by getting your website&#8217;s link on blogs and news websites otherwise known as backlinking. Once this is done, syndicated blogs and social media profiles are used to post updates, otherwise known as Community Outreach. Community outreach is an extension of SEO outreach in which you send out a &#8220;press release&#8221; in the form of posting optimized original content to all your social media accounts such as Twitter, Facebook, LinkedIn, and Google Plus. There are no limits on the number of times a press release on social media can be forwarded to other websites in most cases. That is why this is such an effective strategy for SEO.</p>



<h2>Why is SEO Outreach Important for SEO?</h2>



<p>SEO outreach with the assistance of an Austin SEO Company helps in boosting your brand visibility. When you reach out to relevant people with SEO strategies, they can spread the word about your website and assist you in getting more traffic. You can also use this opportunity to promote your business and increase sales and revenue. When you engage in community outreach, you need to get active on social media platforms such as Facebook, Google+, Twitter, Pinterest, etc., and create an account for your business. A value of community outreach lies in connecting with other people from different industries so that they can provide valuable feedback about your product or service.</p>



<h2>Backlinks You Can Get Through SEO Outreach</h2>



<p>There are numerous ways through which you can get backlinks. The most common one is to ask your friends and colleagues to share the link of your website on their social media profiles. You can also add your website link to your social media profiles. The other method is to accept guest posts from different websites. You must provide high-quality content in exchange for a link. By doing this, you will be able to establish a good rapport with the website owner, and they will be more likely to share your links with their readers and in the process form more backlinks for your SEO endeavors. Backlinks can be a driving search engine optimization force when it comes to driving traffic and your website&#8217;s search visibility on search engine services in Austin.</p>



<h2>Launching Successful SEO Outreach Campaigns</h2>



<p>The most effective way is to write articles and post them on relevant sites. However, digital marketing in the form of SEO is not limited to writing content for blogs in Austin, Texas. You have to share your business with people who are actively looking for new products and services. This can be achieved by distributing quality articles through social media sites like Facebook, Twitter, etc. You can also send emails to various bloggers in your niche and ask them to share your content on their blogs.</p>



<h2>SEO In Austin, TX</h2>



<p>If you are a business owner and looking for something new and exciting to do, partnering with a Austin SEO Company and starting SEO outreach is a perfect option for you. It is all about engaging with people and helping them get what they want from your website. By adding search engine optimization services to your current outreach program in Austin, you will also get more traffic for your website and increase sales and revenue.</p>



<p>Interested in increasing traffic to your website but not sure how to start? TekRESCUE can help! We are an SEO and Digital Marketing company in Austin, Texas &amp; we can get your rankings up and help you reach your customer base more effectively! Give us a call today or visit our website. </p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Reset the Password on Almost Any Windows Computer (Updated for Windows 11)</title>
		<link>/how-to-reset-the-password-on-almost-any-windows-computer/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-reset-the-password-on-almost-any-windows-computer</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Thu, 30 Dec 2021 23:36:20 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[passwords]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[windows]]></category>
		<guid isPermaLink="false">/?p=6213</guid>

					<description><![CDATA[<a href="/how-to-reset-the-password-on-almost-any-windows-computer/" title="How to Reset the Password on Almost Any Windows Computer (Updated for Windows 11)" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2016/02/windows-password-reset.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Locked disc being unlocked by a key" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2016/02/windows-password-reset.jpg 900w, /wp-content/uploads/2016/02/windows-password-reset-600x400.jpg 600w, /wp-content/uploads/2016/02/windows-password-reset-300x200.jpg 300w, /wp-content/uploads/2016/02/windows-password-reset-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>UPDATED 12-30-2021. There is a fault (maybe it&#8217;s a feature) in most later versions of Windows that allows someone with physical access to the computer to change the passwords of users, create new users, and elevate users to administrators. This article will show you how to do this. We are not going to go into...]]></description>
										<content:encoded><![CDATA[<a href="/how-to-reset-the-password-on-almost-any-windows-computer/" title="How to Reset the Password on Almost Any Windows Computer (Updated for Windows 11)" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2016/02/windows-password-reset.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Locked disc being unlocked by a key" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2016/02/windows-password-reset.jpg 900w, /wp-content/uploads/2016/02/windows-password-reset-600x400.jpg 600w, /wp-content/uploads/2016/02/windows-password-reset-300x200.jpg 300w, /wp-content/uploads/2016/02/windows-password-reset-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a><p>UPDATED 12-30-2021.</p>
<p>There is a fault (maybe it&#8217;s a feature) in most later versions of Windows that allows someone with physical access to the computer to change the passwords of users, create new users, and elevate users to administrators. This article will show you how to do this. We are not going to go into extreme detail on this. We are going to assume that you have some basic computer repair skills. We are a San Marcos, TX based managed IT Support business, so we use this hack very often.</p>
<p><strong>Time to Complete</strong>: 30 minutes or less<br />
<strong>Difficulty level</strong>: Medium<br />
<strong>Tools needed</strong>: A Windows Install Disk that matches the operation system on the computer</p>
<p>Note: This method works with several Windows OS&#8217;s. We are going to show you how to do it on a Windows 10 computer.</p>
<h2>Step 1 &#8211; Replace Utilman.exe with CMD.exe</h2>
<p>Boot into the install CD or USB Installer that matches your operating system. If you do not have one there are several tutorials out there that can help you make one.</p>
<p>Click on <strong>Troubleshoot</strong>, then <strong>Advanced options</strong>, and finally <strong>Command Prompt.</strong></p>
<p>At the command prompt type the following command:</p>
<pre><code><strong>copy c:windowssystem32utilman.exe c:</strong></code></pre>
<p>&#8230;and press <strong>Enter</strong>. You should see a &#8220;<em>1 file(s) copied</em> &#8221; confirmation.</p>
<p>Now type this command and hit <strong>Enter</strong>:</p>
<pre><code><strong>copy c:windowssystem32cmd.exe c:windowssystem32utilman.exe</strong></code></pre>
<p>Answer with <strong>Y</strong> to the question about overwriting of the utilman.exe file. You should now see another file copy confirmation.</p>
<p>Reboot the computer normally into Windows.</p>
<h2>Step 2 &#8211; Manipulate the users you need</h2>
<p>NOTE: The following NET commands still work for Windows 11 but for Windows 11 you will need to boot into &#8220;Safe Mode with Networking&#8221; to use them! Thanks Andrew for the tip!</p>
<p>When the Windows logon screen is available, click the <strong>Ease of Access icon</strong> at the bottom-left corner of the screen. An ADMINISTRATOR Command Prompt will open. There are several commands you might need to use below. In them replace &#8220;myuser&#8221; with the actual username. Replace &#8220;newpassword&#8221; with your desired password.</p>
<p>Enter the following command to get a list of users:</p>
<pre><code><strong>net user </strong></code></pre>
<p>Enter the following command to change the password of an existing user.</p>
<pre><code><strong>net user myuser newpassword</strong></code></pre>
<p>Enter the following command to create a new user:</p>
<pre><code><strong>net user myuser newpassword /add </strong></code></pre>
<p>Enter the following command to elevate an existing user to an administrator:</p>
<pre><code><strong>net localgroup administrators myuser /add </strong></code></pre>
<p>Once you have ran than commands that you need to run, log in and double check your work.</p>
<h2>Step 3 &#8211; Putting Utilman.exe Back</h2>
<p>Reboot into the install CD or USB Installer that you used earlier.</p>
<p>Click on <strong>Troubleshoot</strong>, then <strong>Advanced options</strong>, and finally <strong>Command Prompt.</strong></p>
<p>At the command prompt type the following command:</p>
<pre><code><strong>copy c:utilman.exe c:windowssystem32utilman.exe</strong></code></pre>
<p>Confirm the overwriting by answering <strong>Yes</strong>. Reboot your computer. Profit!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Browser Cookies vs Cache: What’s the Difference?</title>
		<link>/browser-cookies-vs-cache-whats-the-difference/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=browser-cookies-vs-cache-whats-the-difference</link>
		
		<dc:creator><![CDATA[Breanna Graves]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 15:55:33 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<guid isPermaLink="false">/?p=18008</guid>

					<description><![CDATA[<a href="/browser-cookies-vs-cache-whats-the-difference/" title="Browser Cookies vs Cache: What’s the Difference?" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/12/cookies-spelled-out.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="lettered dice spelling out the word cookies with a keyboard in the background" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/12/cookies-spelled-out.jpg 900w, /wp-content/uploads/2021/12/cookies-spelled-out-600x400.jpg 600w, /wp-content/uploads/2021/12/cookies-spelled-out-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>Difference Between Cache and Cookies Computers use various technologies to store data and facilitate faster web browsing. Two of these technologies are cookies and cache. Both cookies and cache are means of storing data from your website on a guest&#8217;s device. Defining Browser Cache Browser cache is the temporary storage location of Internet files that...]]></description>
										<content:encoded><![CDATA[<a href="/browser-cookies-vs-cache-whats-the-difference/" title="Browser Cookies vs Cache: What’s the Difference?" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/12/cookies-spelled-out.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="lettered dice spelling out the word cookies with a keyboard in the background" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/12/cookies-spelled-out.jpg 900w, /wp-content/uploads/2021/12/cookies-spelled-out-600x400.jpg 600w, /wp-content/uploads/2021/12/cookies-spelled-out-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<h2>Difference Between Cache and Cookies</h2>



<p>Computers use various technologies to store data and facilitate faster web browsing. Two of these technologies are cookies and cache. Both cookies and cache are means of storing data from your website on a guest&#8217;s device.</p>



<h2>Defining Browser Cache</h2>



<p>Browser cache is the temporary storage location of Internet files that are stored by the client machine (your computer). When you visit a web page, the browser cache stores those cache files in a specific folder. Cache allows for quicker access to commonly requested files. Like when you visit a website with a JPG image logo, your computer will download the image and store it in a specialized folder on your computer called a cache folder.</p>



<p>This makes it easier to access the logo each time you visit that web page. The cache file could also store other things. Things such as video files, JavaScript files, CSS files, images, and different sorts of media that are delivered on the internet.</p>



<h2>How Cache Works</h2>



<p>Imagine you&#8217;re researching an assignment, and you need to consult a book from the library. You could go to the library every time you need a piece of information, but instead, you will most likely take the book home with you and put it on your desk for faster access. In this example, your desk becomes a cache. Instead of making round trips to the library, which slows your progress, you will grab the book straight from your desk. This example intuitively helps you understand how cache works.</p>



<h2>Defining Browser Cookies</h2>



<p>The second technology is browser cookies. Browser cookies are small files stored on a guest&#8217;s device which contain specific data about a particular client. The server stores this information. When you visit a website, its server can store a file on your computer. This file can then be used for various actions. Browser cookies&#8217; main function is to store text-based data like sessions, IDs, web visit histories, IP addresses, and many more. Cookies also enable the collection of more accurate data collection by owners of specific websites.</p>



<h2>Their Functionality</h2>



<p>As you visit a website for the first time, for this example, an online store, the website utilizes a unique identity code to plant a cookie in your computer hard drive. The website then uses this identification code to monitor all of your sessions. This helps monitor activities such as what products you choose to view or put in your online shopping cart, among other things you may have looked at while on the site. With this, you will get similar suggested items despite leaving the website and then returning to it.</p>



<h2>Types of Cookies</h2>



<p>There are two main categories of cookies:</p>



<p>Session cookies: A session cookie is stored in the guests&#8217; machine but never actually saved. It is only operational during a visit to the website by the guest. But when the guest closes their browser, the session cookie becomes unavailable permanently.</p>



<p>Persistent cookies: This type of cookie stays on the guest&#8217;s machine while active and persists for a while on occasional visits to the website. Despite its persistent nature, this cookie has an expiration date.</p>



<p>Both cookies and cache are technologies that have paved the way for more accessible access to internet services. Despite their almost similar functions, these technologies work differently. It is important to know the difference between the two in order to enhance your understanding of the way your devices store information from visited websites.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>tekRESCUE Receives Best of Hays 2020 Award</title>
		<link>/best-of-hays-2020-award/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=best-of-hays-2020-award</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Thu, 08 Apr 2021 16:55:31 +0000</pubDate>
				<category><![CDATA[Digital Marketing]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[best of hays]]></category>
		<guid isPermaLink="false">/?p=15204</guid>

					<description><![CDATA[<a href="/best-of-hays-2020-award/" title="tekRESCUE Receives Best of Hays 2020 Award" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/04/best-of-hays-2020-award.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Gold medal with the San Marcos Daily Record Best of Hays 2020 logo" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/04/best-of-hays-2020-award.jpg 900w, /wp-content/uploads/2021/04/best-of-hays-2020-award-600x400.jpg 600w, /wp-content/uploads/2021/04/best-of-hays-2020-award-300x200.jpg 300w, /wp-content/uploads/2021/04/best-of-hays-2020-award-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>tekRESCUE was once again a contender in the Hays county “Best of Hays” awards this year. Our team was excited to receive top recognition in three categories for 2020! These included: Best Community Volunteer In addition to these company-wide distinctions, our own IT technician Austin Koester was awarded Best Community Volunteer for his work with...]]></description>
										<content:encoded><![CDATA[<a href="/best-of-hays-2020-award/" title="tekRESCUE Receives Best of Hays 2020 Award" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/04/best-of-hays-2020-award.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Gold medal with the San Marcos Daily Record Best of Hays 2020 logo" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/04/best-of-hays-2020-award.jpg 900w, /wp-content/uploads/2021/04/best-of-hays-2020-award-600x400.jpg 600w, /wp-content/uploads/2021/04/best-of-hays-2020-award-300x200.jpg 300w, /wp-content/uploads/2021/04/best-of-hays-2020-award-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">tekRESCUE was once again a contender in the Hays county “<a href="https://etypeservices.com/SWF/LocalUser/Sanmarcos1//Magazine385867/Full/index.aspx?II=385867" target="_blank" rel="nofollow">Best of Hays</a>” awards this year. Our team was excited to receive top recognition in three categories for 2020! These included:</p>



<div style="height:32px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-block-cover is-light is-repeated" style="background-image:url(/wp-content/uploads/2017/12/pattern_escheresque_dark.gif)"><span aria-hidden="true" class="wp-block-cover__background has-background-dim-0 has-background-dim"></span><div class="wp-block-cover__inner-container">
<div class="wp-container-11 wp-block-columns">
<div class="wp-container-8 wp-block-column"><div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" width="180" height="180" title="icon technicians" src="/wp-content/uploads/2015/09/icon_technicians.png" alt="icon of a badge with a wrench on it" class="wp-image-5583" srcset="/wp-content/uploads/2015/09/icon_technicians.png 180w, /wp-content/uploads/2015/09/icon_technicians-84x84.png 84w, /wp-content/uploads/2015/09/icon_technicians-75x75.png 75w, /wp-content/uploads/2015/09/icon_technicians-20x20.png 20w" sizes="(max-width: 180px) 100vw, 180px" /></figure></div>


<h4 class="has-text-align-center">Best Security Company</h4>



<div style="height:24px" aria-hidden="true" class="wp-block-spacer"></div>
</div>



<div class="wp-container-9 wp-block-column"><div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" width="180" height="180" title="icon remote support" src="/wp-content/uploads/2015/09/icon_remote-support.png" alt="icon of a support technician" class="wp-image-5580" srcset="/wp-content/uploads/2015/09/icon_remote-support.png 180w, /wp-content/uploads/2015/09/icon_remote-support-84x84.png 84w, /wp-content/uploads/2015/09/icon_remote-support-75x75.png 75w, /wp-content/uploads/2015/09/icon_remote-support-20x20.png 20w" sizes="(max-width: 180px) 100vw, 180px" /></figure></div>


<h4 class="has-text-align-center">BEST COMPUTER TECH SUPPORT</h4>



<div style="height:24px" aria-hidden="true" class="wp-block-spacer"></div>
</div>



<div class="wp-container-10 wp-block-column"><div class="wp-block-image">
<figure class="aligncenter size-large"><img loading="lazy" width="180" height="180" title="icon monitoring" src="/wp-content/uploads/2015/09/icon_monitoring.png" alt="icon of a heart beat monitor" class="wp-image-5579" srcset="/wp-content/uploads/2015/09/icon_monitoring.png 180w, /wp-content/uploads/2015/09/icon_monitoring-84x84.png 84w, /wp-content/uploads/2015/09/icon_monitoring-75x75.png 75w, /wp-content/uploads/2015/09/icon_monitoring-20x20.png 20w" sizes="(max-width: 180px) 100vw, 180px" /></figure></div>


<h4 class="has-text-align-center">bEST cOMPUTER rEPAIR</h4>



<p></p>
</div>
</div>
</div></div>



<div style="height:32px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-container-14 wp-block-columns">
<div class="wp-container-12 wp-block-column">
<figure class="wp-block-image size-large"><img loading="lazy" width="700" height="500" title="austin 2019" src="/wp-content/uploads/2019/06/austin-2019.jpg" alt="Photo of Austin Koester" class="wp-image-11819" srcset="/wp-content/uploads/2019/06/austin-2019.jpg 700w, /wp-content/uploads/2019/06/austin-2019-600x429.jpg 600w, /wp-content/uploads/2019/06/austin-2019-20x14.jpg 20w" sizes="(max-width: 700px) 100vw, 700px" /></figure>
</div>



<div class="wp-container-13 wp-block-column is-vertically-aligned-center">
<h4>Best Community Volunteer</h4>



<p>In addition to these company-wide distinctions, our own IT technician Austin Koester was awarded Best Community Volunteer for his work with <a href="https://www.family4life.org/" target="_blank" rel="nofollow">Family 4 Life</a>, a non-profit organization dedicated to reuniting siblings separated by adoption.&nbsp;</p>
</div>
</div>



<p>tekRESCUE is proud to accept these awards, and we extend our heartfelt thanks to the voters of Hays county for voting us “Best of Hays” once again this year! We are delighted to continue offering the best technology services to our community in 2021.</p>



<h3><strong>About Best of Hays</strong></h3>



<div class="wp-container-17 wp-block-columns are-vertically-aligned-center">
<div class="wp-container-15 wp-block-column is-vertically-aligned-center" style="flex-basis:33.33%"><div class="wp-block-image">
<figure class="aligncenter size-large is-resized"><img loading="lazy" title="san marcos daily record best of hays 2020 logo" src="/wp-content/uploads/2021/04/san-marcos-daily-record-best-of-hays-2020-logo.png" alt="San Marcos Daily Record Best of Hays 202 logo" class="wp-image-15219" width="200" height="198" srcset="/wp-content/uploads/2021/04/san-marcos-daily-record-best-of-hays-2020-logo.png 400w, /wp-content/uploads/2021/04/san-marcos-daily-record-best-of-hays-2020-logo-84x84.png 84w" sizes="(max-width: 200px) 100vw, 200px" /></figure></div></div>



<div class="wp-container-16 wp-block-column is-vertically-aligned-center" style="flex-basis:66.66%">
<p class="has-drop-cap">The Best of Hays contest takes place in Hays county every spring. Historically Hays county residents voted via newspaper ballots for businesses in a wide range of categories, from best overall company to best sweet tea. However, for the last two years all voting has been done digitally with great success in participation.&nbsp;</p>
</div>
</div>



<p>Residents nominate their favorite businesses for each category and after the nomination period (dates vary by year) voters choose between the top three businesses nominated for each category to determine Best of Hays winners. Voting maintenance, final tallies, and award distribution is all completed by the <a href="https://www.sanmarcosrecord.com/" target="_blank" rel="nofollow">San Marcos Daily Record</a>.&nbsp;</p>



<h3><strong>About tekRESCUE</strong></h3>



<figure class="wp-block-image size-large"><img loading="lazy" width="900" height="506" title="tekrescue boh team photos" src="/wp-content/uploads/2021/04/tekrescue-boh-team-photos.jpg" alt="Photos of the tekRESCUE team in 2020" class="wp-image-15212" srcset="/wp-content/uploads/2021/04/tekrescue-boh-team-photos.jpg 900w, /wp-content/uploads/2021/04/tekrescue-boh-team-photos-815x458.jpg 815w, /wp-content/uploads/2021/04/tekrescue-boh-team-photos-20x11.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></figure>



<p class="has-drop-cap">tekRESCUE is headquartered in <a href="https://goo.gl/maps/KxbAA6UJGfyenihN6" target="_blank" rel="nofollow">San Marcos, TX</a> and has been serving Hays county and the surrounding Central Texas areas for over a decade under the leadership of <a href="/team/">CEO Randy Bryan</a>. Randy already had a long history of technology expertise when he decided to start tekRESCUE. In his experience he saw business after business struggle to deal with the many aspects of technology necessary to succeed in the digital world. His dream in starting tekRESCUE was to offer a way for businesses of any size to get support and find solutions for any of their technology needs – all in one place.</p>



<p>Today tekRESCUE has evolved into a complete technology provider, offering everything from top of the line cybersecurity solutions to all-in-one digital marketing. We serve businesses across Texas and look forward to expanding further in the future.&nbsp;</p>



<p>Seeking technology solutions for your business? Schedule a 20 minute strategy call with Randy to discuss options for your business. For more information about services we offer, please see below.</p>



<div class="wp-block-cover is-light"><span aria-hidden="true" class="wp-block-cover__background has-content-secondary-background-color has-background-dim"></span><img loading="lazy" width="900" height="600" title="radio waves" class="wp-block-cover__image-background wp-image-12748" alt="radio waves" src="/wp-content/uploads/2019/12/radio-waves.jpg" data-object-fit="cover" srcset="/wp-content/uploads/2019/12/radio-waves.jpg 900w, /wp-content/uploads/2019/12/radio-waves-600x400.jpg 600w, /wp-content/uploads/2019/12/radio-waves-300x200.jpg 300w, /wp-content/uploads/2019/12/radio-waves-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /><div class="wp-block-cover__inner-container">
<h2 class="has-text-align-center">Schedule Your 20 Minute Strategy Call</h2>



<div class="wp-container-18 is-horizontal is-content-justification-center wp-block-buttons">
<div class="wp-block-button"><a class="wp-block-button__link has-content-bg-color has-content-primary-background-color has-text-color has-background" href="/schedule">SCHEDULE NOW</a></div>
</div>
</div></div>



<div style="height:24px" aria-hidden="true" class="wp-block-spacer"></div>



<h3><strong>Our Services</strong></h3>



<div class="wp-container-22 wp-block-columns">
<div class="wp-container-19 wp-block-column" style="flex-basis:33.33%">
<figure class="wp-block-image size-large"><img loading="lazy" width="900" height="600" title="network security" src="/wp-content/uploads/2019/07/network-security.jpg" alt="Network Graphic with Padlock" class="wp-image-12017" srcset="/wp-content/uploads/2019/07/network-security.jpg 900w, /wp-content/uploads/2019/07/network-security-600x400.jpg 600w, /wp-content/uploads/2019/07/network-security-300x200.jpg 300w, /wp-content/uploads/2019/07/network-security-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></figure>
</div>



<div class="wp-container-21 wp-block-column" style="flex-basis:66.66%">
<h4>Cybersecurity</h4>



<p>tekRESCUE now offers complete cybersecurity for businesses. This includes network and device protection, managed IT for your office, threat detection and incident response, as well as assistance maintaining HIPAA compliance. tekRESCUE is a <a href="/hipaa-compliance/">HIPAA compliant</a> business.</p>



<div class="wp-container-20 wp-block-buttons">
<div class="wp-block-button"><a class="wp-block-button__link" href="/cybersecurity/">LEARN MORE</a></div>
</div>
</div>
</div>



<div style="height:24px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-container-26 wp-block-columns">
<div class="wp-container-23 wp-block-column" style="flex-basis:33.33%">
<figure class="wp-block-image size-large"><img loading="lazy" width="900" height="600" title="tekrescue mobile designs" src="/wp-content/uploads/2020/03/tekrescue-mobile-designs.jpg" alt="A mobile-first web design mockup drawn on paper" class="wp-image-13980" srcset="/wp-content/uploads/2020/03/tekrescue-mobile-designs.jpg 900w, /wp-content/uploads/2020/03/tekrescue-mobile-designs-600x400.jpg 600w, /wp-content/uploads/2020/03/tekrescue-mobile-designs-300x200.jpg 300w, /wp-content/uploads/2020/03/tekrescue-mobile-designs-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></figure>
</div>



<div class="wp-container-25 wp-block-column" style="flex-basis:66.66%">
<h4>Website Development</h4>



<p>Whether you need a brand new website for your business or need a touch up for an existing website, tekRESCUE can help. We specialize in <a href="/our-portfolio/">sleek, modern sites</a> and offer security and hosting options for those that need it.</p>



<div class="wp-container-24 wp-block-buttons">
<div class="wp-block-button"><a class="wp-block-button__link" href="/it-services/web-development/">LEARN MORE</a></div>
</div>
</div>
</div>



<div style="height:24px" aria-hidden="true" class="wp-block-spacer"></div>



<div class="wp-container-30 wp-block-columns">
<div class="wp-container-27 wp-block-column" style="flex-basis:33.33%">
<figure class="wp-block-image size-large"><img loading="lazy" width="900" height="600" title="internet connection issues" src="/wp-content/uploads/2020/05/internet-connection-issues.jpg" alt="Illustration of a smartphone connecting to the internet with help from San Marcos TX Managed IT service providers" class="wp-image-14246" srcset="/wp-content/uploads/2020/05/internet-connection-issues.jpg 900w, /wp-content/uploads/2020/05/internet-connection-issues-600x400.jpg 600w, /wp-content/uploads/2020/05/internet-connection-issues-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></figure>
</div>



<div class="wp-container-29 wp-block-column" style="flex-basis:66.66%">
<h4>Digital Marketing</h4>



<p>Our team of experts work to improve your presence online using time-tested SEO techniques, social media management, and targeted ad campaigns. From getting your business to #1 in Google to improving your social media audience and interaction, we’re a one-stop-shop for your digital marketing needs.</p>



<div class="wp-container-28 wp-block-buttons">
<div class="wp-block-button"><a class="wp-block-button__link" href="/search-engine-optimization/">LEARN MORE</a></div>
</div>
</div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Common Types of Encryption Demystified</title>
		<link>/common-types-of-encryption/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=common-types-of-encryption</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Thu, 11 Mar 2021 16:05:28 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[encryption]]></category>
		<guid isPermaLink="false">/?p=15130</guid>

					<description><![CDATA[<a href="/common-types-of-encryption/" title="Common Types of Encryption Demystified" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/03/common-types-of-encryption.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="A padlock and chains securing a laptop keyboard" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/03/common-types-of-encryption.jpg 900w, /wp-content/uploads/2021/03/common-types-of-encryption-600x400.jpg 600w, /wp-content/uploads/2021/03/common-types-of-encryption-300x200.jpg 300w, /wp-content/uploads/2021/03/common-types-of-encryption-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>Cybersecurity plays an important role in ensuring that unauthorized individuals cannot access your data. By encrypting your data, your information will be safe from the wrong hands. Not all encryption is the same, however, and some types are more secure or practical than others. The most common ones include RSA, AES, and DES. Below, we&#8217;ll...]]></description>
										<content:encoded><![CDATA[<a href="/common-types-of-encryption/" title="Common Types of Encryption Demystified" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/03/common-types-of-encryption.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="A padlock and chains securing a laptop keyboard" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/03/common-types-of-encryption.jpg 900w, /wp-content/uploads/2021/03/common-types-of-encryption-600x400.jpg 600w, /wp-content/uploads/2021/03/common-types-of-encryption-300x200.jpg 300w, /wp-content/uploads/2021/03/common-types-of-encryption-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">Cybersecurity plays an important role in ensuring that unauthorized individuals cannot access your data. By encrypting your data, your information will be safe from the wrong hands.</p>



<p>Not all encryption is the same, however, and some types are more secure or practical than others. The most common ones include RSA, AES, and DES. Below, we&#8217;ll delve a bit deeper into these main types of encryption to give you a better understanding of the options available when it comes to protecting your data.</p>



<h3>RSA Encryption</h3>



<p>An acronym for “Rivest-Shamir-Adleman” encryption, this technique is commonly used to safeguard data that is sent online, and it usually utilizes public and private keys. If you are on the receiving end, you will have a private key that will be used to decode the message sent by the other party. Through RSA encryption, information can be sent between two different parties who don’t know each other. It&#8217;s perfect if both parties need to communicate while ensuring their sensitive data does not fall into the wrong hands because of a data breach.</p>



<p>If you want to make RSA encryption a part of your routine, you should first understand the basics. For some people, this encryption technique can be used to verify a digital signature. It will allow you to be sure that the person you are communicating with<a href="/hacking-through-deception/" data-type="post" data-id="14893"> is who they say they are</a>. This encryption technique can take a while to encrypt data, so it is not advisable for large files.</p>



<h3>AES Encryption</h3>



<p>Advanced Encryption Standard or AES is among the most secure encryption types commonly used today. Security organizations and the government usually use this encryption type to ensure the communication from one person to another is classified. AES utilizes key encryption that is symmetric, and the party on the receiving end usually receives a key to decode the sent data.</p>



<p>With AES encryption, the data is encrypted into a single block. The size of the blocks varies, and there are different rounds for each encryption method. The rounds entail changing the plaintext data into ciphered text.</p>



<p>The majority of data tools present in the market today utilize AES data encryption. While it&#8217;s still possible to use other methods, AES is highly recommended. It can be used in different applications, and for its price, the encryption method is secure and widely accepted.</p>



<h3>DES Encryption</h3>



<p>Short for Data Encryption Standard, DES is a standard encryption form that was formulated during the 1970s. Currently, it is not considered secure enough by today&#8217;s standards. It can only encrypt 56-bits of data, and it can be easily hacked. Despite some of these issues, this encryption method served as the basis for more encryption tools that would build on top of its foundation.</p>



<p>A more modern take on DES is Triple Data Encryption Standard, which uses three 56-bit keys instead of just one. The only issue with 3DES is that it will take a considerable amount of time to encrypt the data. And although the shorter blocks have been encrypted three times, hackers can still access the secured information.</p>



<h3>Additional Encryption Types</h3>



<p>There are additional encryption tools present in the market, such as the so-called &#8220;fishes.&#8221; These tools use a different type of technology to encrypt data, and they are common among programmers and web developers. They also come in handy when <a href="/complete-guide-to-password-security-2020/" data-type="post" data-id="14378">protecting passwords.</a> These encryption techniques are not patented, so they can be used for free by any interested party.</p>



<h3>Conclusion</h3>



<p>As a consumer, you don&#8217;t need to worry about understanding everything that encryption entails. Just make sure you are familiar with the basics so that you can select security and privacy products that will suit your needs.</p>



<h5><a href="/contact/" data-type="page" data-id="4830"><strong><em>IF YOU&#8217;RE LOOKING FOR CYBERSECURITY FOR YOUR SMALL BUSINESS IN SAN MARCOS TX, CONSIDER CONTACTING TEKRESCUE TODAY!</em></strong></a></h5>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why and How to Backup Your Organization&#8217;s Data</title>
		<link>/how-to-backup-organization-data/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-backup-organization-data</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Mon, 08 Mar 2021 18:34:24 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[austin it services company]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data backup]]></category>
		<category><![CDATA[disaster recovery]]></category>
		<guid isPermaLink="false">/?p=15117</guid>

					<description><![CDATA[<a href="/how-to-backup-organization-data/" title="Why and How to Backup Your Organization&#8217;s Data" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/03/how-to-back-up-organization-data.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Laptop with important company data on screen" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/03/how-to-back-up-organization-data.jpg 900w, /wp-content/uploads/2021/03/how-to-back-up-organization-data-600x400.jpg 600w, /wp-content/uploads/2021/03/how-to-back-up-organization-data-300x200.jpg 300w, /wp-content/uploads/2021/03/how-to-back-up-organization-data-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>When it comes to the day-to-day security of your company’s data, it is critical that its content is protected whether proprietary or not. Whether it’s protection against cyber attacks, corrupt software, or even general concern from fire and natural disasters, there are a lot of reasons you need to back up your data for your...]]></description>
										<content:encoded><![CDATA[<a href="/how-to-backup-organization-data/" title="Why and How to Backup Your Organization&#8217;s Data" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/03/how-to-back-up-organization-data.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Laptop with important company data on screen" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/03/how-to-back-up-organization-data.jpg 900w, /wp-content/uploads/2021/03/how-to-back-up-organization-data-600x400.jpg 600w, /wp-content/uploads/2021/03/how-to-back-up-organization-data-300x200.jpg 300w, /wp-content/uploads/2021/03/how-to-back-up-organization-data-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">When it comes to the day-to-day security of your company’s data, it is critical that its content is protected whether proprietary or not. Whether it’s protection against <a href="/preparing-against-ransomware/" data-type="post" data-id="15039">cyber attacks</a>, corrupt software, or even general concern from fire and natural disasters, there are a lot of reasons you need to back up your data for your organization. The question is always where to start and whom to go to make it happen.</p>



<h3>Why Backups are Important</h3>



<p>Some of the most common reasons why organizations do not back up their data can be things such as the belief that their data is secure, or even citing cost as a negative factor. But ultimately the main reason in business is that people just simply forget because they believe the odds of needing backup data are rare to none. While for most it is very unlikely you will ever need to access backup data, you do not want to be caught in a situation where your company is the small statistic of organizations that for some reason lost their data and could not retrieve any of it.</p>



<h3>Backing Up Personal Non-Proprietary Data</h3>



<p>There are a few ways to back up your data, depending on the amount of data and how proprietary it might be. For personal use, it is still recommended that a flash drive is one of the cheapest and convenient ways to back up data. This is a good system to use if the data is less proprietary in nature and you find yourself out of the office often for work, whether it be travel or telecommuting. This is always the cheapest and easiest way to backup data.</p>



<h3>Backing Up Personal Proprietary Data</h3>



<p>If data is proprietary but still for personal use, it is recommended to use a <a href="/how-cloud-technology-can-help-your-business/" data-type="post" data-id="14541">cloud-based storage system</a>. There are some more common names like Dropbox, but for professional use, you could utilize larger-scale cloud-based storage systems such as Microsoft Azure and OneDrive, or Amazon Web Services applications. These days there are many entities that you can use and can be scalable and relatively cheap based on how much data you have. Cloud-based storage is also convenient for privacy.</p>



<h3>Backing Up Proprietary Company Data</h3>



<p>Finally, if you are looking to store private data for your company, you can always encrypt your data for extra security before placing it in cloud-based backup storage. Many of these same companies mentioned earlier are good at providing these extra layers of security so that your data is always protected both physically and from <a href="/industries-vulnerable-to-hackers-part-1/" data-type="post" data-id="14831">potential data breaches</a>. While the costs of these extra services will ultimately become a bigger expense to maintain, you cannot put a price on security.</p>



<h3>Backups Are Worth the Price</h3>



<p>So overall, backing up data is a simple yet effective way to protect your organization from any potential actions that might compromise your company or personal data. There is always a risk that is associated with your company’s data getting exposed or altered from physical damage or cyber attacks, and data backup is a small price to pay to avoid compromised data or worse—corrupt or erased data. So, don&#8217;t waste any more time and backup your organization&#8217;s data today.</p>



<h5><a href="/contact/" data-type="page" data-id="4830"><strong><em>If you&#8217;re looking for IT support or tech services for your company in Austin Texas, consider contacting tekRESCUE today!</em></strong></a></h5>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How to Prepare Your Organization Against Ransomware Attacks</title>
		<link>/preparing-against-ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=preparing-against-ransomware</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Mon, 08 Feb 2021 22:01:17 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[malware]]></category>
		<guid isPermaLink="false">/?p=15039</guid>

					<description><![CDATA[<a href="/preparing-against-ransomware/" title="How to Prepare Your Organization Against Ransomware Attacks" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/02/preparing-against-ransomware.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="A padlock next to a coin with the Bitcoin symbol" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/02/preparing-against-ransomware.jpg 900w, /wp-content/uploads/2021/02/preparing-against-ransomware-600x400.jpg 600w, /wp-content/uploads/2021/02/preparing-against-ransomware-300x200.jpg 300w, /wp-content/uploads/2021/02/preparing-against-ransomware-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>Ransomware is a threat that happens all too often against businesses and other organizations so that cybercriminals can make a quick buck. In many cases, the victim is forced to pay a ransom in order to regain access to his or her data after it&#8217;s been encrypted by malicious software. Since this type of attack...]]></description>
										<content:encoded><![CDATA[<a href="/preparing-against-ransomware/" title="How to Prepare Your Organization Against Ransomware Attacks" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/02/preparing-against-ransomware.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="A padlock next to a coin with the Bitcoin symbol" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/02/preparing-against-ransomware.jpg 900w, /wp-content/uploads/2021/02/preparing-against-ransomware-600x400.jpg 600w, /wp-content/uploads/2021/02/preparing-against-ransomware-300x200.jpg 300w, /wp-content/uploads/2021/02/preparing-against-ransomware-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">Ransomware is a threat that happens all too often against businesses and other organizations so that cybercriminals can make a quick buck. In many cases, the victim is forced to pay a ransom in order to regain access to his or her data after it&#8217;s been encrypted by malicious software. Since this type of attack is becoming all too common, it&#8217;s important that your organization is prepared for it and that you know what to do if you <a href="/industries-vulnerable-to-hackers-part-3/" data-type="post" data-id="14853">become a target</a> for a ransomware attack.</p>



<h3>1. Educate Your Employees</h3>



<p>Make sure to <a href="/benefit-from-teaching-staff-digital-hygiene/" data-type="post" data-id="14864">explain to your employees</a> what malware will look like that may indicate a potential ransomware attack. They will probably receive an email that has a fictitious link that leads to the ransomware. These emails are considered <a href="/hacking-through-deception/" data-type="post" data-id="14893">phishing schemes</a>, and it is important to safeguard against them. Make sure that your employees know exactly what these emails may look like and that they know how to avoid a response.</p>



<h3>2. Enhance Security</h3>



<p>Make sure that your organization is utilizing security measures in order to defend against all kinds of cyber attacks, including ransomware. If you do not maintain a high standard of security, you run the risk of falling victim to ransomware, especially if you just use <a href="/what-antivirus-does-and-doesnt-do/" data-type="post" data-id="15011">antivirus software</a> and nothing else. Make sure that you frequently <a href="/importance-of-software-updates/" data-type="post" data-id="12073">update your software</a> to ensure it is working its best and all security vulnerabilities are patched. Make sure that your software is set up manually as well so that you can manually turn off the firewall in case an attack comes to your organization as well.</p>



<h3>3. Create Backups</h3>



<p>You need to regularly create a backup that has secure storage of your organization&#8217;s data and your employees&#8217; data. A ransomware attack works best when there is only one copy of the secure data, so when you have a backup, you will face a minimal loss to your organization and a lesser amount of damage. You can even consider software that will backup your data automatically on a regular basis either locally, <a href="/how-cloud-technology-can-help-your-business/" data-type="post" data-id="14541">in a cloud service</a>, or both.</p>



<h3>4. Monitor</h3>



<p>It is also important to consistently have something or someone who is able to monitor the data at your organization. There are pieces of software that are called SIEM tools that are made to respond automatically to any malware attack that they detect, including ransomware. They will look for unexpected logins or unauthorized file sharing to a data source. They will then respond and make the necessary changes to protect your organization and your employees from the impending attack.</p>



<h3>5. Make Patches</h3>



<p>Last but not least, your organization needs to have a system in place that can monitor security patches and manage these patches easily. Develop a system that will manage patches, prioritizing those that are in immediate need of an update or a fix so that ransomware does not occur. Make sure to use a patch as soon as it comes available in order to minimize the chances of a successful attack. When the attack comes, the patch can lock your data down so that it remains safe against hackers.</p>



<h3>Final Thoughts</h3>



<p>Ransomware can cause serious financial damage to your organization if you do not take the necessary precautions to prepare for it and protect against it. Being faced with the choice of losing access to all of your company&#8217;s data or paying a ridiculous ransom can be a frightening prospect. By following the steps above, however, you can help keep your data private and to ensure your employees do not give away this information.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Enterprise Antivirus Software Does and Doesn’t Do</title>
		<link>/what-antivirus-does-and-doesnt-do/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-antivirus-does-and-doesnt-do</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Thu, 04 Feb 2021 16:14:00 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[software]]></category>
		<guid isPermaLink="false">/?p=15011</guid>

					<description><![CDATA[<a href="/what-antivirus-does-and-doesnt-do/" title="What Enterprise Antivirus Software Does and Doesn’t Do" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Keyboard keys with letters spelling &quot;ANTVIRUS&quot;" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do.jpg 900w, /wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do-600x400.jpg 600w, /wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do-300x200.jpg 300w, /wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>When starting or running a business, one would want to do everything they can to protect the valuable data on company computers and other devices used for work purposes. That is where enterprise antivirus software comes in. It can help protect the company and personal data that might be at risk if the business becomes...]]></description>
										<content:encoded><![CDATA[<a href="/what-antivirus-does-and-doesnt-do/" title="What Enterprise Antivirus Software Does and Doesn’t Do" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Keyboard keys with letters spelling &quot;ANTVIRUS&quot;" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do.jpg 900w, /wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do-600x400.jpg 600w, /wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do-300x200.jpg 300w, /wp-content/uploads/2021/01/what-antivirus-does-and-doesnt-do-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">When starting or running a business, one would want to do everything they can to protect the valuable data on company computers and other devices used for work purposes. That is where enterprise antivirus software comes in. It can help protect the company and personal data that might be at risk if the business becomes the target of a cyber attack. A good enterprise antivirus software program can help protect sensitive data from all sorts of threats, including <a href="/hacking-through-deception/" data-type="post" data-id="14893">phishing attempts</a>, trojans, worms, and other malware attacks. New types of viruses are introduced into the world every day, which is why it is necessary to always be protected. When protecting important information on company computers and networks, enterprise antivirus is the best solution for that problem.</p>



<h3>Device Scanning: Humble Beginnings</h3>



<p>Antivirus has improved and evolved since its creation. The original purpose of antivirus software was to scan every single file daily while running in the background to make sure there were not any infected files already on the device. Although this was a great way to secure a system at first, many malware creators found loopholes in the security system that made the antivirus software unable to detect and get rid of the infected code. On top of this, simply scanning existing files offered no way to protect against new files coming into the device or network. It took a long time before antivirus software truly became a game-changer in stopping malware.</p>



<h3>Heuristic Scanning: The Game-Changer</h3>



<p>One way in which antivirus software improved is the added capability of scanning both emails and downloads coming through any app connected to the internet. Now software security companies that offer antivirus protection have multiple security methods that make it difficult for someone to get access to personal data. The heuristic scan was the biggest game-changer in advancing antivirus software. This technological innovation has the capability of detecting new threats even if the software has never detected this type of threat before now. Although heuristic scanning can help protect someone from accidentally downloading a virus, it is not perfect. The heuristic might detect malware that is not malware. An example could be the heuristic flagging and reporting a new Apple update for the computer. While the heuristic is not perfect, it does make it easier to detect unwelcomed intrusions.</p>



<h3>Compromised Devices &amp; Inside Threats: The Weaknesses</h3>



<p>Antivirus software offers protection for one’s data from many sides of the aisle, but there are some things it can’t protect the data from. One of the things antivirus software can’t protect from is compromised devices. If someone has an unprotected device and connects to a company’s WIFI or wired network, then the data on all connected devices could be compromised. Another thing the program can’t protect from is inside threats. The purpose of antivirus software is to protect from outside threats, not inside ones. If an employee decides to do a cyber-attack, or if a malicious actor <a href="/complete-guide-to-password-security-2020/" data-type="post" data-id="14378">obtains employee login credentials</a>, then they could get access to the secure data from the inside. That is why it is very important to watch employees and their behaviors and <a href="/benefit-from-teaching-staff-digital-hygiene/" data-type="post" data-id="14864">educate them on best security practices</a>.</p>



<h3>Final Thoughts</h3>



<p>Although even the best enterprise antivirus software is not perfect and can’t fully protect one’s business or personal files, it is the best thing available. Why take the chance of having information stolen when there are antivirus programs available to greatly reduce the risks? <a href="/industries-vulnerable-to-hackers-part-1/" data-type="post" data-id="14831">Anybody’s information can get stolen</a>, and although no piece of software can magically protect against all possible threats, you can rest much easier knowing that a good antivirus program is doing its part to help protect your company&#8217;s valuable data around the clock.</p>



<h5><strong><em><a href="/contact/" data-type="page" data-id="4830">If you&#8217;re looking for IT consulting services in Austin Texas, consider contacting tekRESCUE, your cybersecurity company, to see how we can help!</a></em></strong></h5>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is HSTS? Does Your Website Need It?</title>
		<link>/what-is-hsts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-is-hsts</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Mon, 25 Jan 2021 22:02:35 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[web browsers]]></category>
		<guid isPermaLink="false">/?p=15001</guid>

					<description><![CDATA[<a href="/what-is-hsts/" title="What is HSTS? Does Your Website Need It?" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/01/what-is-hsts.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Phone displaying a green check mark icon" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/01/what-is-hsts.jpg 900w, /wp-content/uploads/2021/01/what-is-hsts-600x400.jpg 600w, /wp-content/uploads/2021/01/what-is-hsts-300x200.jpg 300w, /wp-content/uploads/2021/01/what-is-hsts-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>Before getting into the weeds of HSTS, let’s talk a little about a protocol called HTTPS. Today, everyone and their mother knows that, unless you see that padlock icon next to your browser’s location bar, your communication is not secure and should not be trusted. But very few people understand the meaning of the word...]]></description>
										<content:encoded><![CDATA[<a href="/what-is-hsts/" title="What is HSTS? Does Your Website Need It?" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2021/01/what-is-hsts.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Phone displaying a green check mark icon" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2021/01/what-is-hsts.jpg 900w, /wp-content/uploads/2021/01/what-is-hsts-600x400.jpg 600w, /wp-content/uploads/2021/01/what-is-hsts-300x200.jpg 300w, /wp-content/uploads/2021/01/what-is-hsts-20x13.jpg 20w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">Before getting into the weeds of HSTS, let’s talk a little about a protocol called HTTPS. Today, everyone and their mother knows that, unless you see that padlock icon next to your browser’s location bar, your communication is not secure and should not be trusted. But very few people understand the meaning of the word “secure” here, or how these security features work.</p>



<h3>What is HTTPS, and Why Is It Important?</h3>



<p>Think about a very simple scenario. You need to check your web based email account, and this service provider doesn’t support HTTPS, only HTTP. You need to log in to get your mail. As you&#8217;re presented with a sign-in form, you type in your username as johnsmith1 as well as your top secret password, which is fluffy2009. Upon submitting your info, the same exact characters go out of your computer and hit the internet as:</p>



<pre class="wp-block-preformatted">j-o-h-n-s-m-i-t-h-1[space]f-l-u-f-f-y-2-0-0-9</pre>



<p>You know that the internet is <a href="/full-stack-security-importance/" data-type="post" data-id="14794">full of bad people</a>, right? And you know that they are waiting for opportunities like this to steal people’s passwords, right? With the simplest of software, they can grab your credentials and pretend to be you to snoop into your email messages when you are not around. You can say, “so what? I have nothing to hide in my email.” Consider that in this hypothetical scenario, your bank account is tied to the same email address. Does it scare you now? It should. The crooks can request a password change and get it in your email. Two seconds later, you can kiss your money in the bank goodbye.</p>



<p>Using HTTPS changes the clear text string above into something like this, referred to as encryption:</p>



<pre class="wp-block-preformatted">Ac89c278dbc4b8c5b0c3fd4b8580b92edd00bc5806a96d6662adfbee248b9afe9f7c9</pre>



<p>It&#8217;s all thanks to that letter “s” at the end of “http.” Good luck getting a username or password out of this string now, Mr. Crook.</p>



<h3>What Is HSTS Then, and Why Is It Important?</h3>



<p>HSTS is an acronym that stands for HTTP Strict Transport Security. Technically speaking, it is a response header sent by the website to the browser, telling the browser that this site can only be contacted via HTTPS protocol, not by plain text HTTP.</p>



<p>Let&#8217;s dig a little deeper into the subject matter with an example. Imagine you want to go visit google.com to run a search. You go to the address bar of your browser and usually type google.com, hit enter and voila, you are there. You do not think about http:// or https:// protocol specification when you are typing the URL you want to go to.</p>



<p>So far, so good, right? websites who prefer https protocol communication generally use a 301 redirect command that changes the URL’s protocol to https and sends your browser back an encrypted response along with the <a href="/what-is-an-ssl-certificate/" data-type="post" data-id="14037">SSL certificate</a> information. This allows your browser to understand how to communicate with this website. Basically, the http communication is transferred to https communication automatically, without the end user doing anything.</p>



<p>Well then, no-harm, no-foul, right? Not necessarily. In the time it takes for the website to switch to https by redirecting via 301 status, there are few milliseconds of time delay. Then there&#8217;s the time required for the site to send the SSL certificate header back to the browser. If the website is a valuable target, those few milliseconds are almost a lifetime for a malicious actor with an extremely powerful computer system to intercept the communication and insert itself between the user and the server. This is the basic definition of &#8220;man in the middle&#8221; attack vector.</p>



<p>On the other hand, if the browser knows that the site is accepting https communications only, by the way of an HSTS table, it starts the communication directly with https:// protocol lead, avoiding the the http to https transfer event time gap. This leaves the malicious listeners of the network traffic with nothing to listen to.</p>



<p>It is an added level of security in layman’s terms.</p>



<h3>How Does Using HSTS Headers benefit Your Website?</h3>



<p>First and foremost, HSTS makes your website virtually impenetrable by the man-in-the-middle attack method. This should give your site’s visitors an extra level of reassurance, especially if your site is an e-commerce site where monetary transactions take place.</p>



<p>Other than the security aspect, by skipping that few milliseconds of delay at the beginning, you shave off quite considerable time of page load traffic. In a day like today, where a website&#8217;s presence in <a href="/how-site-design-affects-seo%ef%bb%bf/" data-type="post" data-id="9776">search engines</a> is greatly influenced by <a href="/infographic-page-speed-all-about-it/" data-type="post" data-id="12341">page load times</a>, this increase in page load speed is as valuable as gold. Did you know that an average website load time today is 15.3 seconds? Did you also know that an average internet user hits the back button or leaves the site if they can not see the page in 3 seconds or less?</p>



<p>Do you really want to lose customers because your site exposes their information to hackers and loads slowly? Probably not.</p>



<p>Between better page load times and improved security, what is there not to like about implementing HSTS? Of course your site can benefit from HSTS headers.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Cloud Technology Can Help Your Business</title>
		<link>/how-cloud-technology-can-help-your-business/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-cloud-technology-can-help-your-business</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Thu, 03 Sep 2020 16:22:00 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<guid isPermaLink="false">/?p=14541</guid>

					<description><![CDATA[<a href="/how-cloud-technology-can-help-your-business/" title="How Cloud Technology Can Help Your Business" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/08/cloud-services.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Man using laptop with cloud services graphic" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/08/cloud-services.jpg 900w, /wp-content/uploads/2020/08/cloud-services-600x400.jpg 600w, /wp-content/uploads/2020/08/cloud-services-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>Many businesses might no longer provide their employees option to choose if they would like to work from home or at the office. Some have had to overnight move a large portion of their business around to accommodate employees working from home in an effort to keep their businesses running. One thing that can help...]]></description>
										<content:encoded><![CDATA[<a href="/how-cloud-technology-can-help-your-business/" title="How Cloud Technology Can Help Your Business" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/08/cloud-services.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Man using laptop with cloud services graphic" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/08/cloud-services.jpg 900w, /wp-content/uploads/2020/08/cloud-services-600x400.jpg 600w, /wp-content/uploads/2020/08/cloud-services-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">Many businesses might no longer provide their employees option to choose if they would like to work from home or at the office. Some have had to overnight move a large portion of their business around to accommodate employees working from home in an effort to keep their businesses running. One thing that can help with this is by moving to the cloud. This can allow company resource to be accessed in different areas (file sharing, employee management, customer management, security, and collaboration), and ultimately provide shared benefits.</p>



<h3>Start with the Professionals</h3>



<p>To start, you should have an IT professional look over whatever systems you are using in order to make sure you transition effectively so your employees are secure and not at risk of leaking information. One of the biggest reasons to move to the cloud is of course the fact that this will let your employees work from home during coronavirus since all they would need to work effectively is a computer.</p>



<h3>Mitigate Damage</h3>



<p>Another big benefit you might see from working at home is that it can limit the amount of damage that data loss can cause. Data recovery is made far easier by making sure you are keeping backups offline and off-site in the cloud, which is part of our policy for protecting any business. This allows you to be ready to handle any disasters that may come your way, and limit down time.</p>



<h3>Increased Security</h3>



<p>Using the cloud can also help ensure that your files are more secure from external sources allowing you to have greater limits on what each person can access. This will limit the possibility of someone hacking into your network. It also means that if someone loses physical access to a laptop, that they can make sure that they are wiped or any access to data the laptop has is now revoked so that the laptop is useless. Although this gives you more fidelity to protect the company data, we still strongly recommend you secure each of your employees machines. It’s important to keep them informed on how they can avoid getting viruses, how they can make sure that they do not get their passwords phished, as well as use proper password protocol. From within a company, you can now ensure that only the correct person is getting access to a specific document, and that sensitive information isn’t being shared to the wrong person.&nbsp;</p>



<h3>Keep it Updated</h3>



<p>Maintenance, especially on-site maintenance, can be accomplished by using cloud services which offer automatic updates since they simply push out updates through their websites without needing everyone to download updates, or the need to install updates on local networks. Since changes are pushed out through the cloud, you can scale up or down more easily, decreasing costs when you have unused space, and upgrade cost when you need to scale up.&nbsp;</p>



<p>These are just some of the benefits of using the cloud for you company. You will notice that by using network optimized software that receive automatic updates, your employees will be able to organize and format items more clearly while the company remains secure.</p>



<h5><strong><em><a href="/contact/" data-type="page" data-id="4830">Looking for data security and cloud structure for your small business? Consider contacting tekRESCUE, your IT and managed service provider, to see how we can help.</a></em></strong></h5>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>[Infographic] Finding the Right Chromebook for Virtual Schooling in 2020</title>
		<link>/infographic-chromebooks-for-virtual-schooling-2020/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=infographic-chromebooks-for-virtual-schooling-2020</link>
		
		<dc:creator><![CDATA[Stephen Mesko]]></dc:creator>
		<pubDate>Mon, 24 Aug 2020 15:41:06 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[infographic]]></category>
		<guid isPermaLink="false">/?p=14519</guid>

					<description><![CDATA[<a href="/infographic-chromebooks-for-virtual-schooling-2020/" title="[Infographic] Finding the Right Chromebook for Virtual Schooling in 2020" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling_featured-image.png" class="webfeedsFeaturedVisual wp-post-image" alt="tekRESCUE presents: Finding the Right Chromebook for Virtual Schooling in 2020" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling_featured-image.png 900w, /wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling_featured-image-600x400.png 600w, /wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling_featured-image-300x200.png 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>As virtual schooling becomes more common, Chromebooks have become the device of choice for schoolwork at home. While many schools offer devices for students to use at no extra charge, these are often times very low budget machines that aren&#8217;t always the best tools for the job. If you or your child could use a...]]></description>
										<content:encoded><![CDATA[<a href="/infographic-chromebooks-for-virtual-schooling-2020/" title="[Infographic] Finding the Right Chromebook for Virtual Schooling in 2020" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling_featured-image.png" class="webfeedsFeaturedVisual wp-post-image" alt="tekRESCUE presents: Finding the Right Chromebook for Virtual Schooling in 2020" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling_featured-image.png 900w, /wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling_featured-image-600x400.png 600w, /wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling_featured-image-300x200.png 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">As virtual schooling becomes more common, Chromebooks have become the device of choice for schoolwork at home. While many schools offer devices for students to use at no extra charge, these are often times very low budget machines that aren&#8217;t always the best tools for the job. If you or your child could use a device upgrade for virtual schooling this year, check out the infographic below to find tekRESCUE&#8217;s recommended Chromebooks for children of all grade levels and college students alike.</p>



<p>If you&#8217;re using a screen reader or would prefer to read our recommendations in text form rather than an image, scroll below the infographic for a transcription of its content. Note that tekRESCUE is not affiliated with or sponsored by any of the brands or products featured here.</p>



<figure class="wp-block-image size-large"><img loading="lazy" width="800" height="3600" title="tekrescue infographic chromebooks for virtual schooling" src="/wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling.png" alt="An infographic with tekRESCUE's recommended Chromebooks for virtual schooling in 2020. Scroll below for a transcription of the content in text form." class="wp-image-14521" srcset="/wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling.png 800w, /wp-content/uploads/2020/08/tekrescue_infographic_chromebooks-for-virtual-schooling-200x900.png 200w" sizes="(max-width: 800px) 100vw, 800px" /></figure>



<h2>What is a Chromebook?</h2>



<p>A Chromebook is a simple-to-use laptop that runs on Google’s Chrome operating system. They’re streamlined for online work and recreation, but offer less versatility and power than Windows laptops and MacBooks.</p>



<h3>Chromebook Pros (Compared to Windows &amp; Mac Devices)</h3>



<ul><li>Lower Prices</li><li>Faster Startup Times</li><li>Easier to Learn and Use the Operating System</li><li>Fewer Distractions from Schoolwork</li></ul>



<h3>Chromebook Cons (Compared to Windows &amp; Mac Devices)</h3>



<ul><li>Limited App Support (limited to Google Play Store and web apps)</li><li>Less Computing Power (CPU / GPU / RAM memory)</li><li>Limited Support for Hardware Accessories</li></ul>



<h2>Features to Consider</h2>



<p>When considering a Chromebook for yourself or your child, it&#8217;s a good idea to consider the following features / specs and ask yourself these questions:</p>



<h3>Practicality</h3>



<ul><li>How portable is it?</li><li>Can the keyboard detach to create a tablet?</li><li>How durable is it?</li></ul>



<h3>Screen</h3>



<ul><li>How large is the screen?</li><li>How good is the display quality and resolution?</li><li>Is it a touch screen with stylus compatibility?</li></ul>



<h3>Style</h3>



<ul><li>Is the casing metal or plastic?</li><li>What colors are available?</li><li>Would a teen use it, or would they be embarrassed to be seen holding it?</li></ul>



<h3>Power</h3>



<ul><li>What processor is inside?</li><li>Can the device multitask?</li><li>Can it play games after homework is finished?</li></ul>



<h3>Storage</h3>



<ul><li>How much internal storage space does it have?</li><li>Is the drive a solid state drive (SSD)?</li><li>Can its storage be upgraded, or are more expensive variations with more storage available?</li></ul>



<h3>Extras</h3>



<ul><li>Does it come with or support any notable accessories?</li><li>Does it have any special features to its design, such as a swiveling screen?</li><li>Does it have extra USB drives for connecting accessories?</li></ul>



<h2>For Elementary School Students: Lenovo Chromebook Duet</h2>



<p>Small and lightweight, this 2-in-1 tablet is perfect for small hands to carry. It includes plenty of storage space and features like front and rear facing cameras to support the latest kids’ education apps.</p>



<ul><li><strong>Great Practicality</strong>—Being a small and lightweight tablet, this device maximizes portability. It includes a keyboard attachment for track pad and keyboard navigation.</li><li><strong>Modest Screen</strong>—While a resolution of 1920 x 1200 is impressive for a 10.1-inch touch screen, this LCD display doesn&#8217;t offer the best picture quality on the market.</li><li><strong>Modest Style</strong>—While there are no colorful variations available, kids can express their personality through the variety of case / stand accessories this tablet works with.</li><li><strong>Modest Power</strong>—While an off-brand MediaTek Helio P60T processor won&#8217;t provide the same kind of multitasking as an Intel chip might, 4GB of system memory is good enough to run most Chromebook apps with no trouble at all.</li><li><strong>Great Storage</strong>—If the already impressive 128GB of internal flash storage isn&#8217;t enough, this device comes with a free 100GB Google One trial for backing up files in Google&#8217;s cloud servers. </li><li><strong>Great Extras</strong>—A combination of front and rear-facing cameras allow for all kinds of possibilities from video calls with family members to augmented reality education apps. A lack of an audio jack is made up for with an included adapter if headphones are needed.</li></ul>



<p>Find this device on <a rel="noreferrer noopener nofollow" href="https://www.bestbuy.com/site/6401727.p?skuId=6401727" data-type="URL" data-id="https://www.bestbuy.com/site/6401727.p?skuId=6401727" target="_blank">BestBuy.com</a>.</p>



<h2>For Middle School Students: Acer Chromebook Spin 11</h2>



<p>A lack of power and storage is made up for with lots of unique features and accessories all rolled into a portable package that&#8217;ll make classmates jealous.</p>



<ul><li><strong>Great Practicality</strong>—This laptop&#8217;s compact, portable size is supplemented by a hinge design that allows for 360° rotation, allowing it to be used as a versatile tablet or laptop.</li><li><strong>Modest Screen</strong>—With an unimpressive 1366 x 768 resolution, its 11.6-inch LED backlit screen won&#8217;t provide the greatest display quality. On the other hand, touch functionality and stylus compatibility make this a substance-over-style screen.</li><li><strong>Great Style</strong>—A sleek, attractive design and the above-mentioned 360° screen rotation give this device a real “wow” factor—an asset that might come in handy when trying to impress a middle schooler.</li><li><strong>Modest Power</strong>—With Intel&#8217;s budget Celeron N3350 processor and the standard Chromebook 4GB of system memory, this laptop can run most supported apps flawlessly, although it isn&#8217;t the best when it comes to multitasking. </li><li><strong>Modest Storage</strong>—A lackluster 32GB of internal flash memory is offset by a 128GB SD card that comes packaged with the device. Plenty of storage as long as your child doesn&#8217;t lose the card.</li><li><strong>Great Extras</strong>—This Chromebook comes packaged with all kinds of accessories, from a protective case to extra USB ports and even a supported Wacom stylus.</li></ul>



<h2>For High School Students: HP Chromebook 15</h2>



<p>With a beautiful display, backlit keyboard and lots of power, this option doesn’t sacrifice on style or versatility—great for school work and after-school recreation alike.</p>



<ul><li><strong>Modest Practicality</strong>—While this laptop offers lots of power for the price, its relatively large and heavy build make it much less portable than the other devices featured here.</li><li><strong>Great Screen</strong>—With a full 1920 x 1080 HD resolution, its 15.6” WLED-backlit touch screen offers excellent display quality and touch input versatility all in one package.</li><li><strong>Great Style</strong>—A sleek and colorful design set this machine apart from the solid grays of most Chromebooks, and an LED-backlit keyboard offers a stylish coat of icing on the already attractive cake.</li><li><strong>Great Power</strong>—While 4GB of system memory may not be impressive, an honest-to-goodness Intel Core i3-8130U processor really shows what it&#8217;s capable of in a device that runs the lightweight Chrome OS.</li><li><strong>Great Storage</strong>—If the onboard 128GB of internal flash memory isn&#8217;t enough, a 100GB Google One trial allows for a versatile, cloud-based option for extending your storage capacity.</li><li><strong>Modest Extras</strong>—While this laptop doesn&#8217;t come with any unique or flashy accessories, it does boast a full keyboard with a numeric key pad as well as an audio jack adapter—two things that most Chromebooks forego in favor of portability.</li></ul>



<p>Find this device on <a rel="noreferrer noopener nofollow" href="https://www.amazon.com/dp/B07ZPF759C/" data-type="URL" data-id="https://www.amazon.com/dp/B07ZPF759C/" target="_blank">Amazon.com</a>.</p>



<h2>For College Students: Samsung Chromebook 4</h2>



<p>This no-frills, no-nonsense option offers a large full HD (FHD) screen at a low price. It&#8217;s great for note-taking as well as using all of the web apps you need to stay organized throughout the semester.</p>



<ul><li><strong>Great Practicality</strong>—While this laptop may have a large screen, it still manages to be thin and lightweight. The fact that it has no extra frills or features means you&#8217;ll get an excellent device at a very low price.</li><li><strong>Great Screen</strong>—This huge 15.6-inch screen boasts full HD resolution of 1920 x 1080 and a minimal bezel, allowing for a beautiful, distraction-free display.</li><li><strong>Modest Style</strong>—With a standard gray body and a no-nonsense, basic design, this laptop isn&#8217;t going to turn any heads. Its thin, sleek build, on the other hand, ensures that you&#8217;ll have an attractive design, even if it is basic.</li><li><strong>Modest Power</strong>—With a standard 4GB system memory and Intel&#8217;s budget Celeron N4000 processor, this Chromebook won&#8217;t be up to too much multitasking—which may end up being a good thing if you&#8217;re trying to focus on class work without any distractions.</li><li><strong>Modest Storage</strong>—A humble 32GB of internal flash memory should be enough for storing class notes and project files, but more expensive device models with more built-in storage are available if you need more room.</li><li><strong>Modest Extras</strong>—This laptop keeps its price low by minimizing its extra features, but it still offers 2USB-C ports for hardware accessories as well as Gigabit Wi-Fi compatibility—useful for virtual meetings with classmates during group projects.</li></ul>



<p>Find this device on <a rel="noreferrer noopener nofollow" href="https://www.samsung.com/us/computing/chromebooks/15-18/chromebook-4-15-6-32gb-storage-4gb-ram-xe350xba-k01us/" data-type="URL" data-id="https://www.samsung.com/us/computing/chromebooks/15-18/chromebook-4-15-6-32gb-storage-4gb-ram-xe350xba-k01us/" target="_blank">Samsung.com</a>.</p>



<p>We hope you found these recommendations helpful in your search for the right virtual schooling device. If you know anyone who could benefit from this sort of information, feel free to share this article or repost the infographic on whatever channel or platform you prefer. And if you need more technology advice or recommendations like these, don&#8217;t hesitate to <a href="/contact/" data-type="page" data-id="4830">contact a technician at tekRESCUE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Browser Should I Be Using?</title>
		<link>/what-browser-should-i-be-using/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-browser-should-i-be-using</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Mon, 10 Aug 2020 19:27:23 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[web browsers]]></category>
		<guid isPermaLink="false">/?p=14482</guid>

					<description><![CDATA[<a href="/what-browser-should-i-be-using/" title="What Browser Should I Be Using?" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/08/modern-browsers.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Collection of modern web browsers" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/08/modern-browsers.jpg 900w, /wp-content/uploads/2020/08/modern-browsers-600x400.jpg 600w, /wp-content/uploads/2020/08/modern-browsers-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>While generally we will not tell someone what specific browser they should use, there are situations that make it clear for some people that one option is better than others. Most browsers that exist today have some upsides with limited downsides, but there are downsides in some form for each browser. In the past, there...]]></description>
										<content:encoded><![CDATA[<a href="/what-browser-should-i-be-using/" title="What Browser Should I Be Using?" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/08/modern-browsers.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Collection of modern web browsers" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/08/modern-browsers.jpg 900w, /wp-content/uploads/2020/08/modern-browsers-600x400.jpg 600w, /wp-content/uploads/2020/08/modern-browsers-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p>While generally we will not tell someone what specific browser they should use, there are situations that make it clear for some people that one option is better than others. Most browsers that exist today have some upsides with limited downsides, but there are downsides in some form for each browser. In the past, there were generally more downsides, but today, most web browsers adhere to a certain set of uniformed standards.</p>



<h3>Google Chrome</h3>



<p>One of the most commonly used browsers now is Google Chrome. Chrome is fairly lightweight, simple, and almost every web developer will use Google Chrome as a template, meaning there is little worry that something will not be compatible with Google Chrome. Another great reason to use Google Chrome is the fact that it automatically will work with all Google Apps, and can sync with Mobile Chrome. It also has a huge extension store, with some of the most uniform design standards meaning that their extensions will work for a long time, and offers the widest range of browser extensions.&nbsp;</p>



<h3>Mozilla Firefox</h3>



<p>Mozilla Firefox is another great option for anyone who is interested in privacy protection. One very cool feature is that it will alert you if your email is involved in a data breach, something that happens more often than not. This is something that most people do not realize can happen, but often times websites that you viewed years ago, will ultimately be hacked, and if you used the same password on this obscure or even mainstream website as you did for your email, you will ultimately end up getting hacked, and be unable to access tons of other websites. It also has auto-block for pop-up ads, and can also stops fingerprinting, meaning that you will not be recognized across websites as being the same person, protecting your privacy.&nbsp;</p>



<h3>Microsoft Edge</h3>



<p>Microsoft Edge is Microsoft’s latest browser. In the past, it was not a very great option, but they have added many new features. This browser now offers a very interesting feature called “NewsGuard”, a bipartisan review of news websites that allows you to see if a news organization is reputable, or if it simply puts out opinion pieces, and how often they put out false news. It is running on Chromium, meaning it shares many features with Chrome itself, as well as Firefox. It is also fairly lightweight, but not the most lightweight option. It also now has add-ons available to it.&nbsp;</p>



<h3>Opera</h3>



<p>Opera is a lightweight browser that has some cool built-in features and also runs on Chromium. Among these features is the ability to use a built-in VPN, great for getting around local content locks when something isn’t available in your country, or when you do not want your internet provider to know exactly what you are looking up. It is speedy, lightweight, and has a built-in ad blocker. While not everyone develops for it specifically, the fact it is Chromium means it doesn’t matter as much since it is built on a common platform.&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Benefits of Building Cross-Platform Mobile Apps</title>
		<link>/benefits-of-building-cross-platform-mobile-apps/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=benefits-of-building-cross-platform-mobile-apps</link>
		
		<dc:creator><![CDATA[Alec Carter]]></dc:creator>
		<pubDate>Fri, 07 Aug 2020 21:11:54 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[cross platform]]></category>
		<guid isPermaLink="false">/?p=14468</guid>

					<description><![CDATA[<a href="/benefits-of-building-cross-platform-mobile-apps/" title="Benefits of Building Cross-Platform Mobile Apps" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/08/responsive-mobile-app.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Cross-Platform App Design" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/08/responsive-mobile-app.jpg 900w, /wp-content/uploads/2020/08/responsive-mobile-app-600x400.jpg 600w, /wp-content/uploads/2020/08/responsive-mobile-app-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>For many people interested in having a mobile app developed, one of their main goals is to reach the widest audience possible and have the biggest impact with their app. This impact might be different for others depending on their type of business. For example, a business app might be to provide coupons or access...]]></description>
										<content:encoded><![CDATA[<a href="/benefits-of-building-cross-platform-mobile-apps/" title="Benefits of Building Cross-Platform Mobile Apps" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/08/responsive-mobile-app.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Cross-Platform App Design" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/08/responsive-mobile-app.jpg 900w, /wp-content/uploads/2020/08/responsive-mobile-app-600x400.jpg 600w, /wp-content/uploads/2020/08/responsive-mobile-app-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">For many people interested in having a mobile app developed, one of their main goals is to reach the widest audience possible and have the biggest impact with their app. This impact might be different for others depending on their type of business. For example, a business app might be to provide coupons or access member plans, while a service or utility app might seek to provide a service in the app itself and provide utility directly; the goal itself is still to reach the widest number of people in regards to your business. If you are developing your app for one specific platform, you might be limiting the reach that your app can have. Developing an app with cross platform in mind can have the bonus of allowing your app to be used as a web app as well as a native phone app.</p>



<h3>One for All</h3>



<p>One benefit of working in a cross-platform development environment is that it allows you to reuse your code base, meaning that you can save time while developing the app. Because Android, web, and iOS normally use different programming languages, you will end up needing to develop every app from start each time you create for a new platform. The only thing that will be shared between platforms is the graphics and content that you use, but not the code base, meaning instead of building 1 app, you are really developing 2 or 3 different apps altogether. Reusing code means cutting down the time that you must spend slowly transforming each module into a whole other language. By cutting down the work you have to do, you can save time, resulting in quicker development time to get a beta app out, quicker to get feedback, quicker to implement changes, and quicker to ultimately get into the app store. When you are using a single script, you will save time and get your app out the door quicker.</p>



<h3>Saving Costly Developers</h3>



<p>This process of saving work and time also means that you are saving money. Since often time it is not the same developer that know both iOS programming (Cocoa language) and Android languages (Java), so to develop without developing cross-platform means that you need more than 1 developer to create your app. The fact that not every language has the same capability, something that might be easily done using one language, might be more difficult to do on another.</p>



<p>Rather than each app being different because it is built in a different language, you can have the same look between different platforms. Achieving this same look will not cost you development time, which also helps your brand maintain its design standards. The fact that it is uniform also means that when it comes time to push out updates, you will only have to develop the update one time, saving you both in development and in managing costs for the app.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Digital Hygiene: What It Is And How To Improve Yours</title>
		<link>/digital-hygiene-how-to-improve-yours/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=digital-hygiene-how-to-improve-yours</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Mon, 13 Jul 2020 21:34:34 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[austin it consulting]]></category>
		<category><![CDATA[austin it services]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">/?p=14362</guid>

					<description><![CDATA[<a href="/digital-hygiene-how-to-improve-yours/" title="Digital Hygiene: What It Is And How To Improve Yours" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/07/person-looking-at-laptop-drinking-coffee.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Person working on laptop drinking coffee" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/07/person-looking-at-laptop-drinking-coffee.jpg 900w, /wp-content/uploads/2020/07/person-looking-at-laptop-drinking-coffee-600x400.jpg 600w, /wp-content/uploads/2020/07/person-looking-at-laptop-drinking-coffee-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>While most people understand physical hygiene, far fewer have heard of &#8220;digital hygiene.&#8221; Digital Hygiene is the process of keeping your digital presence safe, clean, and organized. This can include organizing emails and files, changing what you share with certain accounts, or even using new apps to improve your digital security. The Benefits Of Good...]]></description>
										<content:encoded><![CDATA[<a href="/digital-hygiene-how-to-improve-yours/" title="Digital Hygiene: What It Is And How To Improve Yours" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/07/person-looking-at-laptop-drinking-coffee.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Person working on laptop drinking coffee" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/07/person-looking-at-laptop-drinking-coffee.jpg 900w, /wp-content/uploads/2020/07/person-looking-at-laptop-drinking-coffee-600x400.jpg 600w, /wp-content/uploads/2020/07/person-looking-at-laptop-drinking-coffee-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p>While most people understand physical hygiene, far fewer have heard of &#8220;digital hygiene.&#8221; </p>



<blockquote class="wp-block-quote"><p><strong>Digital Hygiene</strong> is the process of keeping your digital presence safe, clean, and organized. This can include organizing emails and files, changing what you share with certain accounts, or even using new apps to improve your digital security.</p></blockquote>



<h3>The Benefits Of Good Digital Hygiene</h3>



<p>Good digital hygiene is an important part of keeping your information safe online. Everything you do online can potentially expose you to scams or cyber attacks, from sending an email to visiting your favorite social media account. <br><br>Ditching your digital junk and keeping better track of what information you share helps to minimize these threats. It can also be pretty satisfying to whittle a massive pile of backlogged emails down to a small list of important exchanges.</p>



<h3>Tips to Improve Your Digital Hygiene</h3>



<h4>Clean Up Your Inbox</h4>



<p>No matter who your email provider is, it&#8217;s important to remember that emails can share a lot of information. Just accidentally getting your email address on a list circulated by third-party advertisers can lead to security issues. To improve your digital hygiene, try these steps:</p>



<ul><li>Unsubscribe from emails that are no longer relevant. The weekly newsletters from a magazine subscription you no longer have are just going to keep piling up and causing clutter.</li><li>Check email settings in accounts you still use. If you love Pinterest but don&#8217;t want to keep deleting multiple pin suggestions emailed to you daily, change your account settings to turn off these emails.</li><li>Take note of emails from any accounts you&#8217;ve forgotten about or no longer need. It&#8217;s important to know where your information is still live online.</li><li>Organize your inbox into categories with at least one dedicated to account management and security features. </li></ul>



<p>Cutting down the number of emails you receive and organizing them appropriately decreases the chances that you&#8217;ll respond to a scam. If you know who you&#8217;re receiving emails from, you&#8217;re more likely to notice out of place messages from dangerous sources.<br></p>



<h4>Update Your Gear</h4>



<p>Always keep your devices, software, and apps up to date. When your laptop recommends a system update, don&#8217;t keep rescheduling the update for months. Updates can contain important security patches without which your information could be vulnerable. <br><br><strong>NOTE:</strong> A security update doesn&#8217;t mean your device wasn&#8217;t secure before. It means there are new, up to date ways available to prevent new tactics by scammers and hackers to access your information. <br><br>As for old, unused devices, do a factory reset. This keeps random strangers from stumbling onto your digital info should it ever be recycled, donated, or sold.</p>



<h4>Delete Old Accounts</h4>



<p>Every account you use online, from email to social media to games, has access to some of your information, at the very least your email address. While many of us wouldn&#8217;t consider our email address to be &#8220;sensitive information&#8221; it&#8217;s important to keep track of who can access any of your information as much as possible. <br><br>While you cannot control what companies do with your data, you can limit which companies your data goes to. Start by getting a list of old accounts you no longer use. Sign into those old accounts, clear any data you can, unsubscribe from their emails, and request the account be removed. Most apps will provide a downloadable archive of your activity on their service if you like.<br><br>Some companies will continue to keep some of your information from the account, but deleting these old accounts will prevent this information remaining live online for others to find.</p>



<h4>Get a Password Manager</h4>



<p>Now that you&#8217;ve culled your old emails and accounts, you can focus on active accounts. This is where a password manager is useful. <br><br>A password manager is an app that will store and encrypt your login information. Many password managers offer browser extensions that let you autofill login fields when accessing your favorite accounts. This way your password always remains encrypted. </p>



<p>Mixing strong passwords with multiple managers is an effective way to keep yourself guarded online. While some browsers offer password managers, an independent manager is preferable. <br><br>Just add your pruned list of accounts and apps to your password manager and then use it to generate a new password. Most managers will auto-update whenever you create a new password and can also work across multiple devices.</p>



<h4>Enable Multi-Factor Authentication (MFA)</h4>



<p>This security measure requires more than just a password to gain access. Since passwords can be used anywhere, requiring a texted message or a fingerprint greatly stops bad actors from getting into your accounts. If your MFA grants backup codes, type them into your password manager.</p>



<h4>Review Privacy and Security on All Accounts/Social Media</h4>



<p>While your apps and accounts have a lot of info on you, you can gain some control over them. Check if your apps and accounts allow you to veil critical info like your address or birthday from general users and toggle those as secret as you need. Some accounts, such as Google, allow users to control limited information gathered about their data, so be sure to take advantage of those settings where they exist.</p>



<h5><strong><em><a href="/contact/" data-type="page" data-id="4830">Looking for more information about keeping your digital hygiene in top shape? Contact tekRESCUE, a Managed IT support company in Austin, TX, to learn how we can help.</a></em></strong></h5>



<p></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Keep Your Tech Safe During Work From Home</title>
		<link>/keep-your-tech-safe/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=keep-your-tech-safe</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Fri, 26 Jun 2020 16:20:00 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[cyber security]]></category>
		<guid isPermaLink="false">/?p=14309</guid>

					<description><![CDATA[<a href="/keep-your-tech-safe/" title="Keep Your Tech Safe During Work From Home" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/06/cyber-security.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Illustration of padlock imposed over code" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/06/cyber-security.jpg 900w, /wp-content/uploads/2020/06/cyber-security-600x400.jpg 600w, /wp-content/uploads/2020/06/cyber-security-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>Maintaining your cyber security while working from home, especially from a personal device, is of paramount importance. Not only could your personal information be compromised, but security breaches can jeopardize entire companies. No one wants to risk their information being stolen. Fortunately, there are several easy ways to help protect yourself and your business. Protect...]]></description>
										<content:encoded><![CDATA[<a href="/keep-your-tech-safe/" title="Keep Your Tech Safe During Work From Home" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/06/cyber-security.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Illustration of padlock imposed over code" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/06/cyber-security.jpg 900w, /wp-content/uploads/2020/06/cyber-security-600x400.jpg 600w, /wp-content/uploads/2020/06/cyber-security-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">Maintaining your cyber security while working from home, especially from a personal device, is of paramount importance. Not only could your personal information be compromised, but security breaches can jeopardize entire companies. No one wants to risk their information being stolen. Fortunately, there are several easy ways to help protect yourself and your business.</p>



<h2>Protect Your Passwords</h2>



<p>Compromised passwords are one of the biggest threats to cyber security, so it’s important to maintain good digital hygiene with your passwords. Following these few tips can help keep your passwords safe:</p>



<h4>Use a Complicated Password</h4>



<p>While you may be tempted to choose something memorable, such as a birth date or a first pet’s name, passwords that are easy to remember are easy to crack. In 2020 most MSPs recommend that passwords be at least twenty characters long and contain numbers, upper and lowercase letters, and special characters (where allowed).</p>



<h4>Never Reuse Passwords </h4>



<p>We’ve all heard this before, and yet some technology users are still tempted to use one password for multiple accounts. It is important to use a different password for every account so that in the event that one is compromised, you won’t lose access to everything.</p>



<h4>Use a Password Keeper</h4>



<p>Remembering all those unique and complicated passwords would be nearly impossible, and carrying written passwords everywhere you go isn’t any safer than having an easy password or one used among multiple accounts. Instead, use a password keeper, which will encrypt and store your passwords for you. We recommend trying <a href="https://www.lastpass.com/" target="_blank" rel="nofollow">LastPass</a>.</p>



<h2>Dodge Phishing Attacks</h2>



<p>Phishing is a technique used by cyber-criminals to impersonate a legitimate institution in order to get private information from unwary victims. Phishing attacks can occur via phone, text, or most commonly, email. The only way to avoid these attacks is to recognize them as what they are. Here’s how to recognize a phishing email:</p>



<h4>Check the Sender’s Email Address</h4>



<p>If you receive an email from a sender you haven’t communicated with before or don’t recognize, beware. Always check the email address, not just the name that shows up in your inbox view. If the name is something normal (“John Doe”) but the email address is &#8220;xjdc23340@hotmail.com&#8221; you may be looking at a phishing attempt. </p>



<h4>Don’t Be Fooled by Official Logos</h4>



<p>It’s easy enough to look up an Amazon logo in Google Images and illegally use it in an email to entice people into thinking the email is legitimate. Official emails from established companies will always come from a company email address, never from a personal one. </p>



<h4>Pay Attention to Spelling &amp; Grammar Errors</h4>



<p>Many times (though not always) phishing emails will contain a plethora of spelling errors in the body text of the email. Some sentences may not even make complete sense. This can be one of the first and most noticeable signs that the email you’ve received is a phishing attempt.</p>



<h4>Beware of Links in the Email </h4>



<p>Never click on a link in an email you suspect to be a phishing attempt. Even if you think there&#8217;s a chance the email may be legitimate, it’s much safer to contact a company through an official contact method found on their website rather than follow a suspicious link. Phishing links can lead you to websites that will try to steal your information, or even download malware onto your computer.</p>



<h4>Beware of Phone Numbers in the Email</h4>



<p>Some phishing emails even provide a phone number to call for those that don’t want to click a link. This can lead to stealing your information over the phone. If you are really concerned the email may be legitimate, contact the company through an official channel, not one provided in the suspicious email.</p>



<h2>Use AntiVirus Protection for Your Device</h2>



<p>Protecting your device with antivirus software is of the utmost importance. Antivirus software helps keep your personal information secure, and also sensitive business information if you have it on your personal computer.&nbsp;</p>



<p>There is a wide range of malware that can infect your computer, sometimes without your even realizing it has been infected. Antivirus software will attempt to block malware installations from malicious sources. You can also set your antivirus program to regularly scan your device for suspicious applications and files. </p>



<p>Here are some popular antivirus programs you can use to protect your device:</p>



<h4>Bitdefender</h4>



<p>Bitdefender is an excellent antivirus software. They offer both free and paid plans depending on the level of protection you want. Their malware detection engine is highly touted, which makes both their paid and free options popular choices for protecting your devices. </p>



<p>Check out <a href="https://www.bitdefender.com/" target="_blank" rel="nofollow">Bitdefender</a>.</p>



<h4>Avast</h4>



<p>Avast also offers free and paid plans. The free plan has a lot of extra features (including a password manager) compared to other free antivirus software. However, users should be aware that Avast Free Antivirus prompts often (very often) to upgrade to the paid plan, which can annoy some users.</p>



<p>Check out <a href="https://www.avast.com/" target="_blank" rel="nofollow">Avast</a>.</p>



<h4>Malwarebytes</h4>



<p>Malwarebytes also offers free and paid plans. However, users should note that a free option is not currently available for the entire antivirus software, only for the malware-removal tool. This makes the free tool an excellent option to use alongside your antivirus software.</p>



<p>Check out <a href="https://www.malwarebytes.com/" target="_blank" rel="nofollow">Malwarebytes</a>.</p>



<p><strong>!</strong> &#8211; <em>Think your device is already infected? Contact tekRESCUE to <a href="/contact/">speak to an IT technician</a> who can help.</em></p>



<h2>Conclusion</h2>



<p>In closing, keeping your technology secure is important, especially while so many employees are working from home for the first time. Small slip ups can lead to huge security breaches for large and small businesses. Keeping your passwords safe, avoiding phishing attempts, and protecting your information with antivirus software will help prevent these security issues.</p>



<p>Ready to take your device and network security to the next level? Contact <strong>tekRESCUE</strong> to learn about our managed IT solutions for keeping your business safe.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ethernet Vs. Wi-Fi</title>
		<link>/ethernet-vs-wifi/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ethernet-vs-wifi</link>
		
		<dc:creator><![CDATA[Alec Carter]]></dc:creator>
		<pubDate>Tue, 16 Jun 2020 21:40:17 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<guid isPermaLink="false">/?p=14273</guid>

					<description><![CDATA[<a href="/ethernet-vs-wifi/" title="Ethernet Vs. Wi-Fi" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/06/wifi-vs-ethernet.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Router with ethernet cords plugged in" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/06/wifi-vs-ethernet.jpg 900w, /wp-content/uploads/2020/06/wifi-vs-ethernet-600x400.jpg 600w, /wp-content/uploads/2020/06/wifi-vs-ethernet-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>A good internet connection is the backbone of efficiency, especially when getting things done relies on the internet. With the demand for faster internet growing, so are the technological advancements trying to meet this demand. People want to send messages to get responses instantly and conveniently. In the beginning, all connections were made through cables....]]></description>
										<content:encoded><![CDATA[<a href="/ethernet-vs-wifi/" title="Ethernet Vs. Wi-Fi" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/06/wifi-vs-ethernet.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Router with ethernet cords plugged in" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/06/wifi-vs-ethernet.jpg 900w, /wp-content/uploads/2020/06/wifi-vs-ethernet-600x400.jpg 600w, /wp-content/uploads/2020/06/wifi-vs-ethernet-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p>A good internet connection is the backbone of efficiency, especially when getting things done relies on the internet. With the demand for faster internet growing, so are the technological advancements trying to meet this demand. People want to send messages to get responses instantly and conveniently. In the beginning, all connections were made through cables. You could only access the internet by connecting your PC to an Ethernet cable. Then came the wireless connections, WiFi, which makes it possible to connect and access the internet wirelessly. While WiFi had an overwhelming reception, it did not phase out the use of Ethernet. In this article, we compare and contrast WiFi and Ethernet in detail.</p>



<h2>Ethernet Vs. Wi-Fi</h2>



<p>WiFi is the most common type of internet connection. It was introduced in 1999 and connects devices without a physical connection. Ethernet connects devices using LAN. It was introduced in 1973 and allows transmission of data over a network.<br>When comparing WiFi and Ethernet, several factors stand out.</p>



<h3>Speed</h3>



<p>Ethernet is slightly faster as cables are connected directly to the machine. Wireless networks tend to be a bit slower. Ethernet connections can provide speeds of up to 1000Mbps while Wireless connections with a standard of 802.11g had a theoretical standing of a maximum of 54Mbps. With the latest WiFi standard, WiFi speeds are matching up to their competitors with speeds of up t 3200Mbps.<br>WiFi speed can also be affected by the number of users connected. Ethernet, on the other hand, is stable as each user is directly connected on their own.</p>



<h3>Convenience</h3>



<p>Ethernet connections tend to be more stable in comparison to WiFi connections. Ethernet connections usually deliver a consistent speed when downloading or streaming files.<br>WiFi signals can be affected by external environmental factors. You will quickly notice instability in your connection when you move the router even around your home. While you can stabilize this by identifying one spot with the best connection and sticking to it, it can be challenging to achieve the stability that you can get with Ethernet connections.<br>On the other hand, WiFi networks are convenient as you do not need a cable to connect to your device. With a password, you can access the internet even on smaller devices such as your phone. This is not possible with Ethernet cables.<br>There is also no need for multiple cables to allow individual access.</p>



<h3>Security</h3>



<p>Ethernet connections are generally more secure as any data sent over an Ethernet connection can only be accessed by devices that are physically connected to that network. This minimizes any chances of attacks, data loss, or hacking.<br>WiFi is an open network, and data is not safe in such networks. It would be best if you were sure that data is encrypted when sending data over an open network. It can even be a lot riskier to send data over a Public WiFi.</p>



<h3>Other factors to consider:</h3>



<ul><li>Latency-Latency is the speed with which traffic travels from one destination to another. Wireless connections(WiFi)can have delays as they are not as stable as wired connections(Ethernet).</li><li>Portability-With a WiFi router, you can efficiently work from anywhere provided there is a signal. Ethernet connections will require you to set up near the cable.</li></ul>



<h3>Summary</h3>



<p>Both WiFi and Ethernet have their strengths and weaknesses. Ultimately, your choice of whether to go wireless or wired will depend on your needs along with the practicality of the application.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tips for Securing Remote Workers</title>
		<link>/securing-remote-workers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=securing-remote-workers</link>
		
		<dc:creator><![CDATA[Randy Bryan]]></dc:creator>
		<pubDate>Fri, 12 Jun 2020 18:27:45 +0000</pubDate>
				<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[passwords]]></category>
		<guid isPermaLink="false">/?p=14265</guid>

					<description><![CDATA[<a href="/securing-remote-workers/" title="Tips for Securing Remote Workers" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/06/securing-remote-workers.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Illustration of a laptop with a padlock over a world map" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/06/securing-remote-workers.jpg 900w, /wp-content/uploads/2020/06/securing-remote-workers-600x400.jpg 600w, /wp-content/uploads/2020/06/securing-remote-workers-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>Times are changing, and businesses are coming up with digitized ways of doing work. Meanwhile, remote working is becoming the norm for modern organizations that look forward to managing their workforce at the lowest cost. However, working remotely presents a unique challenge because of the information security threat. When employees work from home, they are...]]></description>
										<content:encoded><![CDATA[<a href="/securing-remote-workers/" title="Tips for Securing Remote Workers" rel="nofollow"><img width="900" height="600" src="/wp-content/uploads/2020/06/securing-remote-workers.jpg" class="webfeedsFeaturedVisual wp-post-image" alt="Illustration of a laptop with a padlock over a world map" loading="lazy" style="display: block; margin-bottom: 20px; clear:both;max-width: 100%;" link_thumbnail="1" srcset="/wp-content/uploads/2020/06/securing-remote-workers.jpg 900w, /wp-content/uploads/2020/06/securing-remote-workers-600x400.jpg 600w, /wp-content/uploads/2020/06/securing-remote-workers-300x200.jpg 300w" sizes="(max-width: 900px) 100vw, 900px" /></a>
<p class="has-drop-cap">Times are changing, and businesses are coming up with digitized ways of doing work. Meanwhile, remote working is becoming the norm for modern organizations that look forward to managing their workforce at the lowest cost. However, working remotely presents a unique challenge because of the information security threat. When employees work from home, they are exposed to cyber attacks due to the lack of security controls afforded by an office network environment. Here are some strategies your business can implement to protect your employees when they work outside the office.</p>



<h3>Discourage Use of Public Wi-Fi</h3>



<p>While most employees isolate themselves socially while working from home, the use of public Wi-Fi is very common among remote workers. A pubic connection increases security risk because other people can access the same network. This potentially allows anyone to easily access crucial company data if there is no firewall. In addition to this, an interested party on the same public system may monitor your workplace data hits and traffic. It is therefore safer to encourage the use of personal networks or hot spots that will ensure that your employees’ data is encrypted.</p>



<h3>Enforce Strong Password Security</h3>



<p>Password safety is a very reliable means of protecting organizational data. As such, offering password security training is an important step in ensuring that your remote employees’ data is protected. Changing passwords regularly is more crucial now than ever before to ensure maximum security; this should be done every month or after a few months.</p>



<p>Another way to mitigate data security risk is by using a password manager that randomly generates passwords while also storing all the passwords safely. This way, employees will access the company data securely without needing to struggle with remembering all those different passwords every day.</p>



<h3>Enforce Use of 2-Factor Authentication</h3>



<p>Most companies are currently relying on a two-factor authentication (2FA) approach to secure their data. This ensures that the user&#8217;s identity is first confirmed through username and password, then another piece of information is requested, such as a PIN or a “secret question.” With 2FA, passwords cannot be stolen or compromised since it is unlikely that an attacker can guess the correct PIN or question’s answer. You may take a step further by considering a multi-factor authentication, which requires additional verification, such as voice, fingerprint, or retina verification.</p>



<h3>Educate your Workforce</h3>



<p>Another way of ensuring that your remote workers’ data is safe is to make sure they know how to recognize and stop any security threats. This may require a long-term training and refreshers that help the staff identify the changing risks in the digital working arena. Also, you need a remote work policy that includes security updates, internet access guidelines, and particular messaging applications that would ensure every employee avoids any insecure data access methods. The more informed your team is about cyber security, the more they will be keen on data protection.</p>



<h3>Use Encryption Software</h3>



<p>Another way to protect remote workers is through the use of encryption software. In case an individual’s device is lost or stolen, the information on the device should never find its way into the wrong hands or cause data breaches. By using encryption software, you will be able to protect the company data against any unauthorized access. Additionally, the programs used for communication should have end-to-end encryption to avoid data leakage.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
