Contact us today!
925-283-9555
facebooktwitterlinkedinMurphy, McKay & Associates, Inc. RSS Feed

Murphy, McKay & Associates, Inc. Blog

Murphy, McKay & Associates, Inc. has been serving the Lafayette area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What It Means To Disinfect Your Computer

What It Means To Disinfect Your Computer

We have no problem going on the record as saying that there are more than enough strains of malware to go around. As such, it’s important that you know what to do if your workstation is struck by an infection.

Continue reading
0 Comments

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

You’ve been told that it’s a best practice to ensure that you never leave your workstation without locking it first. Yet, if you’re only stepping away for a few minutes, it might be tempting to just allow it to remain unlocked. But what happens when you step away for longer than expected? You leave your computer exposed to all manners of threats. Thankfully, a new solution allows for a fix with a device that most are never without: the smartphone.

Continue reading
0 Comments

Do You Need Data Backup? The Answer: Absolutely

Do You Need Data Backup? The Answer: Absolutely

Data backup is something of a conundrum for many small businesses. The classic mindset is that they don’t think they need data backup because there’s no way they’ll be struck with a data loss disaster. Their office may not be located in a place prone to natural disasters, and the organization is so small that the assume they are off the hook when it comes to hackers. This doesn’t reduce the value that a good data backup system can offer, though.

Continue reading
0 Comments

Need A Better Method Of Software Acquisition?

Need A Better Method Of Software Acquisition?

What are some of the critical business applications that your organization depends on in order to function? Perhaps it’s something as simple as an email solution, or your productivity suite. If either of these stopped working properly, would you be able to sustain operations? What if your software licenses ran out and you lost access to them? These are some of the many pains of traditional software acquisition, and a new method of this can help you make significant headway in managing your organization’s technology.

Continue reading
0 Comments

Tip of the Week: Preserve Your Privacy With These 3 Websites

Tip of the Week: Preserve Your Privacy With These 3 Websites

With the explosive popularity of social networking, the Internet seems to be a less private place than ever. With both communication and cyber crime rising in commonality, online privacy seems to be turning into a less attainable goal than ever. However, for this week’s tip, we’ll review some of the tools out there that can help you fight for your right to privacy.

Continue reading
0 Comments

Google Instant Is Dead… Did You Notice?

Google Instant Is Dead… Did You Notice?

Users can expect a change to how Google delivers results going forward, as the search engine has killed off its ‘Instant’ feature. This feature--introduced in 2010--influenced how results were displayed, and when.

Continue reading
0 Comments

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

LeakerLocker Takes Exposure to New Heights By Sharing Your Mobile Browser History

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing history.

Continue reading
0 Comments

Unified Threat Management Keeps Your Network Safer

Unified Threat Management Keeps Your Network Safer

Network security is equally important for businesses of all sizes. Ensuring that your infrastructure remains firm is one of the most crucial tasks in managing a business. You don’t have to do it alone, though. There are enterprise-level tools available that can give small businesses the same security standards as larger organizations, and it all starts with a Unified Threat Management (UTM) solution.

Continue reading
0 Comments

Tip of the Week: How To Be Better At Time Management

Tip of the Week: How To Be Better At Time Management

It would be hard to find someone who has never experienced the feeling of a time crunch, a situation where someone has more to do than they had hours to do it in. This feeling can be reduced by enhancing productivity through better time management. For our tip this week, let’s discuss some methods to improve time management within your office.

Continue reading
0 Comments

Your Cheat Sheet For Server Care

Your Cheat Sheet For Server Care

Servers are responsible for the distribution and storage of your business’s data infrastructure, as well as the deployment of important applications and data. However, if your organization is responsible for the upkeep and maintenance of these server units, you’ll be tasked with having the knowledge of how to keep them in optimal shape. We’ll discuss some of the ways you can better take care of your server units, as well as the optimal solution: server hosting.

Continue reading
0 Comments

Is VoIP A Part Of Your Business Yet? It Should Be

Is VoIP A Part Of Your Business Yet? It Should Be

What is your business’s preferred method of communication? It’s usually email or some type of telephone solution. Especially for a telephony solution, you need to make sure that your communication infrastructure is designed specifically for your organization. To this end, a traditional telephone system could be holding your business back from achieving its most lofty goals.

Continue reading
0 Comments

Tip of the Week: Google Drive Is Even Handier With These 3 Tips

Tip of the Week: Google Drive Is Even Handier With These 3 Tips

Google Drive is certainly a worthy cloud solution, and if you have the good fortune of using it for your organization, you know that it can offer everything from word processing to file storage options. However, there are always hidden features that can help you improve the way you use Google Drive. We’ll walk about three of the lesser known ways to use Drive that can help you better use it for your organization’s benefit.

Continue reading
0 Comments

Does Your Network Management Seem Unmanageable?

Does Your Network Management Seem Unmanageable?

There’s no denying that there is a lot to do in a business environment, and some things take longer than others...or at least they should. Is your business investing enough time into its network management, and all the tasks, processes, and responsibilities that it involves?

Continue reading
0 Comments

Keep Your Best Employee From Becoming Your Worst Problem With Data Management

Keep Your Best Employee From Becoming Your Worst Problem With Data Management

Chances are that you, like most business owners, have assembled your staff very carefully, looking for people who are the best-in-class, willing to work their hardest for the good of the company. However, this staff will be made up of humans, and will therefore make mistakes. As such, you need to make sure that your data is managed in a way that keeps it safe.

Continue reading
0 Comments

Remote Management and Monitoring is Ideal for SMBs

Remote Management and Monitoring is Ideal for SMBs

When you experience troubles with your technology, you don’t have time to just sit around and wait for the problem to resolve itself. You need someone by your side to assist with the problem. Yet, many small businesses don’t have the luxury of an in-house IT department that can help its employees resolve problems quickly and efficiently. How can you avoid this common issue and keep downtime to a minimum in the process?

Continue reading
0 Comments

Tip of the Week: How to Clear Browser Cache in Chrome, Firefox, and Edge

Tip of the Week: How to Clear Browser Cache in Chrome, Firefox, and Edge

Is your web browser running as well as it should be? Sometimes you might experience situations where your browser freezes or crashes. If your web browser starts acting up, you can troubleshoot what’s wrong by trying to clear the cache.

Continue reading
0 Comments

7 Habits of Highly Effective PC Users

7 Habits of Highly Effective PC Users

Security is an incredibly important part of running any business, but unless you’re a professional IT technician, you may run into a couple of roadblocks while implementing a solution. Chief among these is not knowing exactly what you’re protecting your business from. Keep the following tips in mind to reinforce your security strategy and preserve your business infrastructure’s integrity.

Continue reading
0 Comments

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Continue reading
0 Comments

You Can Save Money By Hosting Data in the Cloud (Depending How You Do It)

You Can Save Money By Hosting Data in the Cloud (Depending How You Do It)

Cloud computing is taking the business world by storm. Despite this, not every organization has made the switch. While every company that hasn’t yet migrated to the cloud has their reasons, one big reason often tops the list: the perceived lack of cost savings. Thanks to a new study, this perception is now proven to be inaccurate.

Continue reading
0 Comments

Employees at Each Other’s Throats? Try These Team-Building Exercises

Employees at Each Other’s Throats? Try These Team-Building Exercises

How do you refer to your group of employees? If you’re like most businesses, you call your employees your ‘team.’ This only makes sense, as a team is meant to work together toward a common goal. But what if your team isn’t acting very much like one?

Continue reading
0 Comments

Free Consultation

free consulting

Sign up today for a FREE Network Consultation

How secure is your IT infrastructure?  Let us evaluate it for free!

Sign Up

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Hackers Business Computing Internet Backup Managed Service Provider Malware Productivity Microsoft Hardware IT Support Business Saving Money Hosted Solutions Software Data IT Services Disaster Recovery Efficiency Workplace Tips Email Business Management Business Continuity Network Mobile Device Management Virtualization Network Security Small Business Google Mobile Devices Upgrade BYOD User Tips Windows Computer Ransomware Smartphones Alert Managed IT services Passwords The Internet of Things Smartphone Server Social Media Remote Monitoring Apps History VoIP Windows 10 Vendor Management Innovation Facebook Apple Remote Computing Collaboration Operating System Android Gadgets Mobile Computing Microsoft Office Managed IT Services BDR Unified Threat Management Wifi Outsourced IT Information Technology Save Money Tech Support Firewall App Wireless Technology IT Support Communication Health Holiday Hard Drives Data management Budget Internet of Things Miscellaneous Windows 8 Saving Time SaaS Bandwidth Spam Quick Tips Productivity Document Management Content Filtering Analytics Recovery Bring Your Own Device Managed IT Computers Big data IT Consultant Best Practice Education Encryption communications Antivirus Save Time Networking Computer Repair Printer Help Desk Going Green Risk Management Phone System Mobile Office Solid State Drive tablet Users Hard Drive Marketing IT Management Search Money Legal Hosted Solution Phishing Browser Training Black Market Gmail Automation Laptop Hiring/Firing Running Cable Lithium-ion Battery Proactive IT Router Password Network Congestion Virus Employer-Employee Relationship Computing Customer Service Intranet Fax Server Drones Telephone Systems Co-Managed IT Wireless Retail Politics Update Law Enforcement Settings Windows 10 End of Support Cleaning Company Culture Data storage Hacker Outlook Websites Downtime User Cybersecurity Flexibility Documents Uninterrupted Power Supply USB Avoiding Downtime Office Tips Automobile VoIP Office YouTube File Sharing How To Website Virtual Desktop IBM Twitter Robot IT Service Public Cloud Programming Cloud Computing Telephony Artificial Intelligence Business Growth Mobility Compliance Administration Paperless Office Touchscreen Regulations Customer Relationship Management Maintenance Recycling Worker Upgrades Social Engineering Computer Malfunction Capital Tracking Software as a Service Google Wallet Gagdets Read Best Available Monitors Rental Service Organize Webcam Cache Unified Communications Wi-Fi Securty Display CrashOverride Digital Payment Flash Displays Web Server Bata Backup Cryptocurrency Licensing Cybercrime Electricity thin client Virtual Reality Hacks Vendor Managament Permissions Messenger Vendor Mangement Computing Infrastructure CIO Content Management Digital Value Workers switches Language PDF Start Menu Writing Access Sync Business Mangement Society Business Metrics Data Backup User Error Archive iPhone Google Docs Notifications Cost Management Safety LiFi Work/Life Balance Comparison Spyware Adminstration Computer Care Hacking Chromebook Data Recovery IT consulting Tablets Office 365 Fun Bluetooth Visible Light Communication Skype VPN Two-factor Authentication Excel Data Protection Mobile Device Meetings Google Drive Cortana Digital Signature Samsung Micrsooft Web Design Memory Microserver Identity Theft travel Printer Server Corporate Profile Assessment Music Statistics Experience Teamwork Streaming Media Proactive Google Maps Turn Key Advertising Text Messaging Current Events Heating/Cooling Wearable Technology Word Taxes Consultation Download Trending Sports Windows10 Video Surveillance The Internet of Thing Distributed Denial of Service Government Product Reviews WannaCry PowerPoint Supercomputer Time Management Processors Gaming Console Windows XP Computer Accerssories Cabling Deep Learning DDoS Botnet Social Emails Disaster Productuvuty Employer Employee Relationship Unified Threat Management Microchip Human Resources

Free Whitepaper

Sign up today for a FREE Whitepaper

Find out how your company can benefit from Managed IT Services today

Download

QR-Code