General IT

My Email Was Hacked – Now What?

If you get a call from your coworker asking about a weird email that you’ve sent – and you definitely did NOT send them anything – it’s likely you’ve been hacked. Don’t panic! There are a few basic steps you need to take, but it doesn’t have to be a disaster.   Contain the Breach Before anything, change your…

Read More

Quick Ways to Speed Up Your Old Computer

If you can speed up your computer, that often means improving your overall work performance as well. As your computer ages and as you use it more, it’s natural for it to seem slower than it did when you first bought it. Before committing to buying a new computer outright, though, there’s some things you…

Read More

Coronavirus Phishing – Don’t Be Fooled by New Online Scams

COVID-19 has cyber-attacks on the rise: Email phishing attacks have spiked over 600% since March 2020 due to the ongoing pandemic. Hackers will routinely take advantage of current world events, and the coronavirus is no exception. Last year, the median small business received 94% of its detected malware by email. [1] Now more than ever, you need to be on your toes when checking unsolicited emails.  Coronavirus-themed phishing has come…

Read More

Get down to Business by Getting your Website UP

With businesses starting to slowly reopen in Kitsap and Clallam County, everyone is scrambling to market and get their business back up off the ground. Now more than ever, YOUR ONLINE PRESENCE MATTERS.  Consumers are asking a number of questions before deciding who to bring their business to. Questions like:  Are they open?  Is their office…

Read More

How much should you spend on I.T. this year?

Year-End Budget Evaluation is right around the corner. An IT Assessment & Plan can help you make accurate IT cost projections to include in your business’ budget.  Every successful business needs a budget. Your business is more likely to make money when you are strategic about how you spend it. While developing your budget, it’s crucial to factor in I.T. costs, especially…

Read More

Are you disposing of your devices properly?

We talk about safely disposing of data on hard drives all the time. However, computers aren’t the only things with hard drives. Printers and fax machines need to be wiped clean before being disposed of. Printers and fax machines must have their hard drives completely wiped clean before being disposed of. These machines often keep…

Read More

How Office 365’s reporting functions can benefit your organization!

How Office 365’s reporting functions can benefit your organization! Your organization might have Office 365- but chances are you aren’t utilizing all the resources that Microsoft provides! One of the ways you can have a big impact on your organization is through reporting on Office 365 usage. What kinds of reports are available? Active Users…

Read More

Use different passwords for different accounts!

Using the same password for multiple accounts could expose all your accounts following a single security breach. Be sure to use complex and unique passwords for each account. If you use the same password for multiple accounts, you increase your overall risk. The breach of a single account could potentially lead to the breach of…

Read More

Protect Yourself from Phishing Scams

What are Phishing scams? Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises (e.g., your university, your Internet service provider, your bank). These messages usually direct you to a spoofed website or otherwise get you to divulge private information (e.g., passphrase, credit card, or other account updates). The perpetrators then use…

Read More

Safely Dispose of Old Computers

It’s important to erase all personal information from old computers before disposing of them Simply reformatting a hard drive or reinstalling the operating system does not guarantee the old data is unreadable. You must physically destroy the hard drive or use a special “wipe” program. At Kitsap Networking we use government compliant data destruction software…

Read More