by Bob Herman | Dec 13, 2019 | IT Tropolis Blog |
Maybe you’re an avid Windows keyboard shortcut user who recently started working on a Mac. Or perhaps you’re a long time Mac user who has rarely used keyboard shortcuts. Regardless of your situation, these Mac keyboard shortcuts will save you lots of...
by Bob Herman | Sep 18, 2019 | IT Tropolis Blog |
In recent weeks we’ve seen an uptick in phishing/fake emails and TXT/SMS messages asking people to access voicemails. In most cases, the emails will contain a link to a fake web page asking you to logon to your email system. Please beware of fake logon pages...
by Bob Herman | Jul 8, 2019 | IT Tropolis Blog |
In our numerous conversations with small business owners across the United States, nearly every one of them told us they want a strong online presence and want to be on page one of Google search results. The problem, they confide, is that they’re not sure what...
by Bob Herman | Apr 5, 2018 | IT Tropolis Blog |
The Problem – Since an email may actually be legitimate, how to determine if fake / phishing I’m often asked how to determine if an email is fake, or as the industry likes to dream up fancy names, let’s call it a phishing email. The phishing emails...
by Susan Ranford | Mar 29, 2018 | IT Tropolis Blog |
Why Physical Security is Just as Important as Online Security in Your Business Physical security of any business requires implementing strategies that ensure all essential and private data, networks, software, gadgets, amenities, properties, and staff are secured....
by Danish Wadhwa | Jan 10, 2018 | IT Tropolis Blog |
Cloud computing has recently been the focus of the IT community. Traditionally, when organizations wanted to improve their computation capacity and data, they had two solutions: buy more hardware if the budget allows, or increase the efficiency of IT operations (but...
Recent Comments