General IT

How much should you spend on I.T. this year?

Year-End Budget Evaluation is right around the corner. An IT Assessment & Plan can help you make accurate IT cost projections to include in your business’ budget.  Every successful business needs a budget. Your business is more likely to make money when you are strategic about how you spend it. While developing your budget, it’s crucial to factor in I.T. costs, especially…

Read More

Are you disposing of your devices properly?

We talk about safely disposing of data on hard drives all the time. However, computers aren’t the only things with hard drives. Printers and fax machines need to be wiped clean before being disposed of. Printers and fax machines must have their hard drives completely wiped clean before being disposed of. These machines often keep…

Read More

How Office 365’s reporting functions can benefit your organization!

How Office 365’s reporting functions can benefit your organization! Your organization might have Office 365- but chances are you aren’t utilizing all the resources that Microsoft provides! One of the ways you can have a big impact on your organization is through reporting on Office 365 usage. What kinds of reports are available? Active Users…

Read More

Use different passwords for different accounts!

Using the same password for multiple accounts could expose all your accounts following a single security breach. Be sure to use complex and unique passwords for each account. If you use the same password for multiple accounts, you increase your overall risk. The breach of a single account could potentially lead to the breach of…

Read More

Protect Yourself from Phishing Scams

What are Phishing scams? Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., your university, your Internet service provider, your bank). These messages usually direct you to a spoofed website or otherwise get you to divulge private information (e.g., passphrase, credit card, or other account updates). The perpetrators then use…

Read More

Safely Dispose of Old Computers

It’s important to erase all personal information from old computers before disposing of them Simply reformatting a hard drive or reinstalling the operating system does not guarantee the old data is unreadable. You must physically destroy the hard drive or use a special “wipe” program. At Kitsap Networking we use government compliant data destruction software…

Read More

Stormy weather ahead!

As severe weather rolls in here are a list of good websites and phone numbers to be familiar with! Power out? Check PSE’s website for outages in your area and estimated time service will be restored: Puget Sound Energy: 1-888-225-5773 https://pse.com/accountsandservices/ServiceAlert/Pages/Outage-Map.aspx Internet out after a power outage? Try rebooting both your router and your modem.…

Read More

When Was The Last Time You Updated the Firmware On Your Firewall?

Firewalls are powered by two things: the hardware inside them and the firmware that makes them operate. The firmware embedded on the firewall is the software that enables the device to filter traffic and prevent unwanted traffic on the network. Like any software, firmware can also be improved, bugs can be found and repaired, new…

Read More

Why Is It Important To Change Your Online Passwords?

Your computers carry a lot of sensitive and important data, so keeping that data safe is a major priority! One security tip for computer users is to constantly change your passwords  to something new, but it may not always be   clear why you need to do so. Changing your password avoids several dangers, here…

Read More

Finding An Antivirus That Works For You

Everyone with a computer needs antivirus, but with so many to choose from how can you pick which software is best for you? First Narrow down your options based on the operating system you use. If you’re planning to upgrade soon or downgrade, take that all into consideration. Second Assess how you use your computer.…

Read More