by Bob Herman | Dec 13, 2019 | IT Tropolis Blog |
Maybe you’re an avid Windows keyboard shortcut user who recently started working on a Mac. Or perhaps you’re a long time Mac user who has rarely used keyboard shortcuts. Regardless of your situation, these Mac keyboard shortcuts will save you lots of...
by Bob Herman | Sep 18, 2019 | IT Tropolis Blog |
In recent weeks we’ve seen an uptick in phishing/fake emails and TXT/SMS messages asking people to access voicemails. In most cases, the emails will contain a link to a fake web page asking you to logon to your email system. Please beware of fake logon pages...
by Bob Herman | Jul 8, 2019 | IT Tropolis Blog |
In our numerous conversations with small business owners across the United States, nearly every one of them told us they want a strong online presence and want to be on page one of Google search results. The problem, they confide, is that they’re not sure what...
by Bob Herman | Apr 5, 2018 | IT Tropolis Blog |
The Problem – Since an email may actually be legitimate, how to determine if fake / phishing I’m often asked how to determine if an email is fake, or as the industry likes to dream up fancy names, let’s call it a phishing email. The phishing emails...
by Susan Ranford | Mar 29, 2018 | IT Tropolis Blog |
Why Physical Security is Just as Important as Online Security in Your Business Physical security of any business requires implementing strategies that ensure all essential and private data, networks, software, gadgets, amenities, properties, and staff are secured....
by Danish Wadhwa | Jan 10, 2018 | IT Tropolis Blog |
Cloud computing has recently been the focus of the IT community. Traditionally, when organizations wanted to improve their computation capacity and data, they had two solutions: buy more hardware if the budget allows, or increase the efficiency of IT operations (but...
by Bob Herman | Nov 10, 2017 | IT Tropolis Blog |
Our president speaks out on 5 big challenges facing CIOs and IT leaders in 2018: “As an IT leader, I think the biggest challenge going into 2018 is how to successfully prepare for and defend against cybersecurity attacks while at the same time ensuring systems are...
by Tropolis Group | Aug 22, 2017 | IT Tropolis Blog |
We’re proud to announce that our Co-founder & President Bob Herman has been quoted in the following news article: http://www.businessnewsdaily.com/7928-work-computer-employee-monitoring.html Following is an excerpt from the article: Have you ever wondered if...
by Tropolis Group | Aug 17, 2017 | IT Tropolis Blog |
We’re excited that our Co-founder & President Bob Herman has been quoted in the following news article: Cyber Security Predictions for 2018: The Top Experts Speak Following is an excerpt from the article: Cyber security is an escalating topic that’s...
by Tropolis Group | Jul 31, 2017 | IT Tropolis Blog |
Password security may be overlooked, but strong passwords can be a key to keeping your company information secure. Here’s how to create them: Read more
Recent Comments