Contact us today!
925-283-9555
facebooktwitterlinkedinMurphy, McKay & Associates, Inc. RSS Feed

Murphy, McKay & Associates, Inc. Blog

Murphy, McKay & Associates, Inc. has been serving the Lafayette area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How to Print Directly From Your Android Device

Tip of the Week: How to Print Directly From Your Android Device

Have you ever tried to print something from your smartphone? Yes, we know that sounds kind of absurd--but it’s certainly not impossible. In fact, it’s often easier to do this than sending yourself an email with the attachment, or accessing the files on your desktop. We’ll go over how you can print a document or picture from your Android smartphone so that you can make things just a little bit simpler.

Continue reading
0 Comments

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

ALERT: Major Wi-Fi Vulnerability Discovered - What You Should Know

A major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-Fi users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

Continue reading
0 Comments

Android Starts Zero-Touch With Google Pixel, More To Follow?

Android Starts Zero-Touch With Google Pixel, More To Follow?

Google’s Android line of smart devices have made their presence well-known in the business world. Google now offers a zero-touch enterprise solution for its Pixel-line mobile devices. The primary reason for this is that mobile devices are somewhat time-consuming to set up, especially on the business level. You can save time by pre-configuring these devices for your business to use using Pixel’s zero-touch solution.

Continue reading
0 Comments

Tip of the Week: Your Desktop Needs Some TLC, Too

Tip of the Week: Your Desktop Needs Some TLC, Too

Does your business struggle with maintaining its Windows workstations? If you do, we fully understand any frustrations you might have. It can be challenging and time-consuming to keep your technology in proper working order, but it doesn’t have to be. With a couple of proactive tips to help you better manage your computers, you’ll be able to waste less time and stay productive during your workday.

Continue reading
0 Comments

A Network Audit Is A Good Idea. Here’s Why

A Network Audit Is A Good Idea. Here’s Why

Does your organization have an internal IT department? If so, you’ve probably noticed that they are too busy problem solving to focus on improving your infrastructure. If they do have time to innovate, chances are they’re neglecting important maintenance. All it takes to improving your infrastructure and operations is, contacting your local managed service provider.

Continue reading
0 Comments

Data Security Must Be a Priority for Your Organization

Data Security Must Be a Priority for Your Organization

After 143 million people had their personal information put at risk in the Equifax data breach, it comes as no surprise that data security is an even hotter topic than usual. As much as you’d like to think that a breach like that would never happen to your business, this is an unrealistic hope that won’t do you any good if the threat of a data breach does come around. It is much better to be prepared.

Continue reading
0 Comments

Tip of the Week: Know Exactly How Far It Is from Point A To Point B With Google Maps

Tip of the Week: Know Exactly How Far It Is from Point A To Point B With Google Maps

Who needs a GPS device when you have all that you need, right in your pocket? We’re talking, of course, about your smartphone. Whether you have an Android device or an iPhone, Google Maps can make for a great alternative, and it sure beats trying to use an atlas. You can use Google Maps to chart the distance between any target destinations and your current location. You can even use it to get the total distance for an upcoming vacation.

Continue reading
0 Comments

How To Spot A SMiShing Attempt

How To Spot A SMiShing Attempt

Phishing--it’s a threat that tells a tantalizing lie to entrap its target, and one that you’ve likely heard of before. However, as technology has advanced, so have the opportunities that cybercriminals have to leverage phishing attempts. Smartphones, for instance, make it so that you must be aware and on the lookout for SMiShing scams.

Continue reading
0 Comments

Equifax Freeze PINs Aren’t As Secure As They Could Be

Equifax Freeze PINs Aren’t As Secure As They Could Be

The Equifax data breach has been a considerable issue for countless individuals, exposing sensitive information that could lead to identity theft and so much more. In response to this breach, some experts are recommending that consumers go as far as freezing their credit lines because of the potential for breaches. Well, it all comes down to a PIN--something that can be easily guessed by a hacker under the right circumstances.

Continue reading
0 Comments

Tip of the Week: 5 Reminders To Protect You Against Ransomware

Tip of the Week: 5 Reminders To Protect You Against Ransomware

The Internet is a vast place filled to the brim with threats, especially for businesses that need to preserve the integrity of their infrastructure and keep critical data safe. The Cisco 2017 Annual Cybersecurity Report states that ransomware is growing at a yearly rate of 350%, which is a considerable number to say the least. Here are five tips that can help you keep your business safe from ransomware infections.

Continue reading
0 Comments

Cybersecurity Awareness Is a Featured Theme in October

Cybersecurity Awareness Is a Featured Theme in October

Every October, the Department of Homeland Security (DHS), United States Computer Emergency Readiness Team (CERT), and the Federal Bureau of Investigation (FBI) join forces to drive cyber security awareness. Cybercrime is a constant threat to individuals and businesses, alike. In fact, the risk is so significant that the US government decided to step up and offer information and resources stressing the importance of cyber security and raise awareness on the best practices to utilize when protect your nonpublic information.

Continue reading
0 Comments

Business Continuity In 3 Easy Steps

Business Continuity In 3 Easy Steps

Business continuity is an incredibly important part of running a business, but some smaller organizations underestimate just how crucial it is in the event of a disaster. Although FEMA estimates that more businesses are taking advantage of business continuity than ever before, not enough are. Business continuity is something that must be planned for, practiced consistently, and updated as needed. Does your business have a business continuity plan?

Continue reading
0 Comments

Tip of the Week: IT Has A Lot Of Jargon… How Much Do You Know?

Tip of the Week: IT Has A Lot Of Jargon… How Much Do You Know?

If you spend more than ten minutes with anyone from the technology industry, you may notice that they have a rather colorful vocabulary. It’s not too vulgar or anything, but it is chock-full of buzzwords that you may not fully understand. Here are some of the most frequently used words in the IT industry.

Continue reading
0 Comments

In The Wake Of A Disaster, Beware Of Charity Scams

In The Wake Of A Disaster, Beware Of Charity Scams

Wanting to give donations in the wake of a disaster is admirable. However, with so many regions of the United States having been devastated by a natural disaster in recent weeks, there are dozens of illegitimate charities out there looking to take advantage of your generosity and compassion.

Continue reading
0 Comments

Tip of the Week: If You Prefer Windows 8’s Start Menu, You’re In Luck!

Tip of the Week: If You Prefer Windows 8’s Start Menu, You’re In Luck!

When Windows 8 launched, users of the operating system were all up in arms because they deviated from the Start menu that we know and love, in favor of a tiled menu screen. While many people went out and found the extension that turned tiles into the classic Start menu, others got used to working with the tile menu. With the release of Windows 10, the Start menu was back as the primary interface. If you’re one of those who adapted and enjoyed the tile menu of Windows 8, we’ve got good news: The tile menu is available on Windows 10!

Continue reading
0 Comments

100 Countries Hit By Android DDoS Malware

100 Countries Hit By Android DDoS Malware

In what is one of the first attacks of its kind, a botnet dubbed WireX swept across 100 countries, controlling over 120,000 IP addresses at its peak. The factor that made WireX so unique was the fact that the botnet was made up of Android-powered devices that had one of 300 malicious apps downloaded from the Google Play Store.

Continue reading
0 Comments

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

ALERT: Equifax Data Breach Potentially Exposes 44 Percent of All Americans

In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans.

Continue reading
0 Comments

48 Vulnerabilities Resolved On Patch Tuesday

48 Vulnerabilities Resolved On Patch Tuesday

Microsoft’s monthly Patch Tuesday issued resolutions to 48 vulnerabilities in August, including 15 that affected Windows, 25 critical flaws, 21 important flaws, and 27 that allowed for remote execution. This is a lot to consider, but the main jist of this is that lots of threats were fixed, and that your organization shouldn’t risk not implementing them as soon as possible.

Continue reading
0 Comments

Tip of the Week: Improving Outlook With Three Tips

Tip of the Week: Improving Outlook With Three Tips

Does your business use Microsoft Outlook as its preferred email client? It’s likely that you have already noticed how dynamic of a solution it is for your business purposes, but little do you know that the most recent version of Outlook is stacked with some of the best features out there to make your user experience even better.

Continue reading
0 Comments

Network Security Needs To Be A Team Effort

Network Security Needs To Be A Team Effort

Network security is more than just a conscientious attempt by your staff to protect your organization’s digital assets. It’s making sure that your employees know how to handle dangerous situations, implementing preventative IT measures to eliminate potential issues entirely, and having the right technology experts on-hand to handle tough problems that can’t be solved by a few pieces of technology.

Continue reading
0 Comments

Free Consultation

free consulting

Sign up today for a FREE Network Consultation

How secure is your IT infrastructure?  Let us evaluate it for free!

Sign Up

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Business Computing Hackers Internet Backup Managed Service Provider Productivity Microsoft Malware IT Support Business Hardware Software Hosted Solutions Data Saving Money IT Services Efficiency Disaster Recovery Email Network Security Business Continuity Network Workplace Tips Business Management Small Business Mobile Device Management Google User Tips Virtualization Upgrade Ransomware Alert Mobile Devices Computer Passwords BYOD Windows Managed IT services Server Smartphone Smartphones Android Remote Monitoring Apps Social Media The Internet of Things Vendor Management Windows 10 Collaboration History Remote Computing Operating System VoIP IT Support Innovation Wifi Gadgets Apple Managed IT Services Facebook Microsoft Office Unified Threat Management Information Technology Save Money Outsourced IT Productivity Data management BDR Tech Support Mobile Computing Holiday Managed IT Windows 8 Firewall Saving Time App Wireless Technology Communication Internet of Things Budget Hard Drives Miscellaneous Encryption Health Phishing Bring Your Own Device Education Law Enforcement Content Filtering Legal Analytics communications Quick Tips Document Management SaaS Bandwidth IT Consultant Spam Big data Computers Recovery Windows 10 Best Practice tablet Mobile Office Search Disaster Marketing Solid State Drive Hard Drive Going Green Data Backup Save Time Phone System Data Recovery Hiring/Firing Money Users Outlook Running Cable Antivirus Automation Artificial Intelligence Hosted Solution Cybersecurity Computer Repair Printer Gmail Training Black Market IT Management Browser Risk Management Networking Help Desk Laptop Scam YouTube Programming Uninterrupted Power Supply Unified Communications Website End of Support Drones Public Cloud USB Google Maps Government Intranet Customer Service Administration Data storage Computer Care Cloud Computing Flexibility IBM Telephone Systems Word Update VoIP Automobile Paperless Office Retail Twitter Cleaning VPN How To DDoS Computing Employer-Employee Relationship Office Tips Virtual Desktop Proactive IT Password Router Co-Managed IT IT Service Maintenance Project Management Network Congestion Robot Telephony Virus User Mobility Emergency Compliance Lithium-ion Battery Documents Office Vulnerability Company Culture Touchscreen Websites Hacker Settings Avoiding Downtime Business Growth Wireless File Sharing Downtime Start Menu Politics Fax Server Language Windows10 Access Google Wallet Web Server Time Management Bluetooth Samsung Download Messenger Computer Accerssories Skype Spyware Taxes Unified Threat Management Experience Wearable Technology Tablets Knowledge Microchip Social Vendor Managament Excel Data Protection Permissions Video Surveillance Hacking Writing iPhone Work/Life Balance Gaming Console travel Cache Digital Payment Emails Software as a Service Sports Tech Terms switches Hacks Read Corporate Profile Office 365 Securty Product Reviews Assessment Comparison Display Access Control Teamwork Webcam Gagdets Cryptocurrency Safety Regulations Google Docs Meetings Content Management Cabling Data Security IT consulting Notifications PowerPoint Best Available Proactive Capital Consultation CIO Identity Theft Organize Supercomputer Patch Management Archive Worker Data Loss Windows XP Social Engineering Microserver Value Productuvuty Society Recycling Bata Backup Cybercrime The Internet of Thing Employer Employee Relationship Redundancy User Error Virtual Reality Micrsooft Licensing Data Breach Rental Service Heating/Cooling Turn Key Electricity Sync Vendor Mangement Cortana thin client Computing Infrastructure Audit Upgrades Memory WannaCry Music Distributed Denial of Service Business Mangement Processors Wi-Fi Streaming Media Printer Server Printing LiFi Deep Learning Cost Management Flash Digital Signature Fun CrashOverride Trending Botnet Human Resources Tracking Customer Relationship Management Business Metrics PDF Adminstration Visible Light Communication Monitors Web Design Digital Statistics Computer Malfunction Google Drive Workers Business Technology Chromebook Mobile Device Current Events Advertising Text Messaging Two-factor Authentication Displays

Free Whitepaper

Sign up today for a FREE Whitepaper

Find out how your company can benefit from Managed IT Services today

Download

QR-Code