Contact us today!
925-283-9555
facebooktwitterlinkedinMurphy, McKay & Associates, Inc. RSS Feed

Murphy, McKay & Associates, Inc. Blog

Murphy, McKay & Associates, Inc. has been serving the Lafayette area since 1992, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Facebook, Gmail, and Slack are Becoming More Collaborative

Facebook, Gmail, and Slack are Becoming More Collaborative

In the modern business setting, collaboration drives productivity. As a result, many software developers are producing software with collaboration in mind. Since these developers are all in competition with each other for market share, they are typically trying to build on more advanced features to outmaneuver the other companies. Some of the biggest names in the industry have recently updated their products to make collaboration a priority. This week we’ll take a look at updates made to Facebook Workplace, Gmail, and Slack.

Continue reading
0 Comments

Tip of the Week: The Basics of Data Backup

Tip of the Week: The Basics of Data Backup

Data backup and disaster recovery are two of the linchpins of any business that relies on data and IT solutions storing information. Your business needs to have a plan for when operations are interrupted due to an unforeseeable data loss event. There are a few ways that you can keep your data backups as safe and efficient as possible.

Continue reading
0 Comments

How Fake News Can Influence Business

How Fake News Can Influence Business

Information is one of the most valuable assets available to businesses, but to be fair, there’s an awful lot of falsified information found on the Internet. Due to the increased focus on data acquisition and dissemination, false information is more harmful and easy to manipulate than ever before. The thing about this is that “fake news” is actually reliant on technology to work.

Continue reading
0 Comments

A DDoS Attack Hits Your Productivity and Profits

A DDoS Attack Hits Your Productivity and Profits

How quickly could your business recover if it were suddenly hit by a Distributed Denial of Service, or DDoS, attack? Are you protected against the effects they could have on your operations? If asked these questions, most businesses should want to say yes, but in reality, over half lack the means to defend against DDoS.

Continue reading
0 Comments

Without These Tools, Your Network Isn’t Secure

Without These Tools, Your Network Isn’t Secure

Your business might have a limited budget, but this shouldn’t hold you back from implementing the best and strongest security solutions. However, security isa complicated process for any business. This is problematic, especially since common threats and vulnerabilities show up frequently in the business environment. We’ll walk you through some security basics so that you can optimize your organization's protection.

Continue reading
0 Comments

How Much of 2016’s $825 Billion in Unpaid Invoices Were Owed to You?

How Much of 2016’s $825 Billion in Unpaid Invoices Were Owed to You?

The primary reason that businesses are opened is to make money. Whether it’s to sustain a lifestyle, provide funds for a cause, or some other goal, a business needs an incoming cash flow in order to stay open. However, this is a fairly large problem for many small businesses, as their invoices often don’t return in a timely manner.

Continue reading
0 Comments

Microsoft SharePoint Makes Team Collaboration Easy

Microsoft SharePoint Makes Team Collaboration Easy

Businesses are taking advantage of new tools every day to make sure that their projects are handled in the most successful way possible. One of these tools is Microsoft SharePoint, which can eliminate many of the major pain points of project management. Regardless of what type of business you run, we’re confident that Microsoft SharePoint can be a valuable asset for your organization. Here are three ways you can take advantage of SharePoint.

Continue reading
0 Comments

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Tip of the Week: Gmail Is Made Even Easier When You Use Filters

Your email inbox can quickly become an overwhelming mess without the proper management, but who has the time to sort through their email inbox on top of all of their other, more urgent responsibilities? Fortunately for Gmail users, the program provides the answer with its filter feature. For this week’s tip, we’ll show you how to regain control of your inbox with filters.

Continue reading
0 Comments

Would Your Users Fall For These Social Engineering Schemes?

Would Your Users Fall For These Social Engineering Schemes?

Social engineering is one of the trickiest parts of protecting your organization. It might sound like something out of a science fiction flick, but it’s one of the most dangerous attacks that a hacker can use against your business. Social engineering attempts to manipulate the target into giving away sensitive credentials or personal information for the purpose of stealing identities and other malicious intentions.

Continue reading
0 Comments

Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

Tip of the Week: Your Mouse Can Do a Lot With a Click or Two

You might think you know all of the tricks that a mouse is capable of, but you would be wrong. Here are some of the niftiest uses possible for your mouse.

Continue reading
0 Comments

Holiday Shopping Just Got Easier--Check out These Gadgets!

Holiday Shopping Just Got Easier--Check out These Gadgets!

It can often be difficult to figure out what to get someone for a holiday gift. Fortunately, there is almost always a new gadget or gizmo that can make someone with particular interests happy. In this blog, we’ll go over a few cool gadgets that make excellent special-interest gifts.

Continue reading
0 Comments

These Smartphones May Make Your Holiday Season Brighter

These Smartphones May Make Your Holiday Season Brighter

The holiday season is upon us, which means that many will soon be opening packages in the hopes of finding a mobile phone nestled inside. Perhaps you or a loved one are one of these people. However, deciding upon a phone to request has become more difficult, as the market has become inundated with options.

Continue reading
0 Comments

How to Get the Most Out of Your Security Budget

How to Get the Most Out of Your Security Budget

Running a business isn’t cheap, which results in budgets becoming strained under their operational needs. A major contributor to this strain is often the security-focused line items. However, there are a few means and methods to getting the most out of your security budget.

Continue reading
0 Comments

Are You Guilty of These Computer Goofs?

Are You Guilty of These Computer Goofs?

Everyone makes mistakes. This is especially true when it comes to the technology that is used by your organization every single day. For this week’s tip, here are some things to avoid when using your computer.

Continue reading
0 Comments

Are These 3 Challenges Holding Your Patch Implementation Back?

Are These 3 Challenges Holding Your Patch Implementation Back?

How many applications does your business use on a daily basis? Managing and maintaining them all can be quite the challenge for a number of reasons--particularly if your organization doesn’t have a dedicated IT technician. It’s important that you take a look at your current situation and determine what roadblocks there are that could cause problems for your organization's securty.

Continue reading
0 Comments

Leveraging AI Might Be What Stops Hackers

Leveraging AI Might Be What Stops Hackers

There are times that hackers can’t interfere with data, and then there are times that hackers really can’t interfere with data. CERN, the Conseil Européen pour la Recherche Nucléaire (European Council for Nuclear Research) maintains far too powerful of a computer grid to risk it falling into the control of hackers. To protect it, CERN leverages the cutting edge of security to protect its European Laboratory for Particle Physics: artificial intelligence.

Continue reading
0 Comments

Tip of the Week: It’s Easy to Color-Code Your Google Drive

Tip of the Week: It’s Easy to Color-Code Your Google Drive

By default, folders in Google Drive display as a muted gray color. Unfortunately, this simplistic choice can make certain folders difficult to find in a sea of gray. For this week’s tip, we’ll go through how to change the color that a folder displays in Google Drive.

Continue reading
0 Comments

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

Bad Rabbit Ransomware Strikes Targets in Eastern Europe

In yet another widespread ransomware attack, Eastern European countries saw an assortment of their critical establishments and infrastructures struck by an infection known as Bad Rabbit. Government buildings, media establishments, and transportation centers were among the targets of this attack.

Continue reading
0 Comments

Security Should Come In Two Parts

Security Should Come In Two Parts

As you run your business, you need to remember a few things. First, your digital security is an incredibly important consideration, as your crucial data could be tampered with or stolen outright. However, you can’t forget the shared importance of your physical security systems and how they will keep your business safe as well.

Continue reading
0 Comments

Tip of the Week: Google Calendar Has Gotten An Update

Tip of the Week: Google Calendar Has Gotten An Update

Have you checked your Google Calendar recently? Google has given the app quite the polish, both visually and functionally--particularly for those who use its business-grade G Suite for maximum productivity. How will you use this revamped version of Google Calendar for your organization? Let’s find out!

Continue reading
0 Comments

Free Consultation

free consulting

Sign up today for a FREE Network Consultation

How secure is your IT infrastructure?  Let us evaluate it for free!

Sign Up

Tag Cloud

Security Tip of the Week Technology Privacy Cloud Best Practices Hackers Business Computing Backup Internet Malware Managed Service Provider Productivity Microsoft Business Hardware Software Data IT Support Saving Money Hosted Solutions IT Services Email Network Security Efficiency Disaster Recovery Business Continuity Business Management Small Business User Tips Network Workplace Tips Google Mobile Device Management Ransomware Virtualization Computer Upgrade Mobile Devices Alert Passwords BYOD Smartphones Windows Remote Monitoring Managed IT services Server IT Support Smartphone Android Apps Collaboration Social Media VoIP The Internet of Things Vendor Management Facebook Windows 10 History Remote Computing Gadgets Innovation Operating System Wifi Microsoft Office Mobile Computing Outsourced IT Managed IT Services Apple BDR Unified Threat Management Save Money Information Technology Holiday Productivity Cybersecurity App Tech Support Data management Managed IT Budget Gmail Hard Drives Encryption Windows 8 Phishing Firewall Analytics Communication communications Saving Time Miscellaneous Wireless Technology Health Document Management Internet of Things Artificial Intelligence Bandwidth Spam Big data Recovery Bring Your Own Device Computers Browser Legal Risk Management Best Practice Education Content Filtering Law Enforcement Quick Tips Update IT Management IT Consultant Windows 10 Money SaaS Computer Repair Mobile Office Black Market Hard Drive Data Backup Cost Management Help Desk Search Data Recovery Networking Marketing Laptop tablet Disaster Project Management Users Going Green Solid State Drive Mobility Phone System Antivirus Save Time Training Hiring/Firing Printer Outlook Running Cable Hosted Solution Automation End of Support Network Congestion Lithium-ion Battery Mobile Device Fax Server Public Cloud Software as a Service Compliance Documents Google Maps Computer Care Office Company Culture Hacker Cloud Computing Access Control Telephone Systems Business Growth Wireless VoIP Touchscreen Automobile Paperless Office Downtime File Sharing Computing How To Patch Management Administration YouTube Unified Communications Programming Website USB Social Engineering Drones Robot IT Service Customer Service travel Government Office 365 Telephony IBM Data storage Intranet Retail Distributed Denial of Service Co-Managed IT Word Emergency Comparison Router Flexibility Google Docs Maintenance Vulnerability Twitter Virus Cleaning DDoS Websites VPN Settings Office Tips Employer-Employee Relationship Virtual Desktop Start Menu Politics Proactive IT Password Scam Uninterrupted Power Supply User Avoiding Downtime Current Events Tablets Knowledge Microchip Music Processors Data Protection Mobile Technology Digital Signature Writing Emails Work/Life Balance Microsoft Excel Tech Terms Streaming Media Hacks Customer Relationship Management LiFi Human Resources Corporate Profile Mobile Payment Cache Trending PDF Visible Light Communication Vendor Managament Regulations Excel Television Windows10 Assessment Text Messaging Meetings Statistics Gaming Console Advertising Two-factor Authentication Cabling Data Security Notifications Google Wallet Capital SharePoint Computer Accerssories Consultation Supercomputer Identity Theft Worker Data Loss Bluetooth Micrsooft Video Surveillance The Internet of Thing Webcam Experience Productuvuty Evernote Gagdets Bata Backup Skype Social Employer Employee Relationship Redundancy Virtual Reality iPhone PowerPoint Permissions Hacking Licensing Data Breach Wearable Technology Rental Service Electricity Data Warehousing Sync Vendor Mangement Organize Digital Payment Computing Infrastructure switches Microserver Read Audit Sports Teamwork Upgrades Memory Securty WannaCry Windows Server 2008 Business Mangement Product Reviews Wi-Fi Cryptocurrency Turn Key Safety Printing Display Best Available Deep Learning Mouse Flash CrashOverride Windows 7 Specifications Botnet Tracking Business Metrics IT consulting Downloads Content Management Value Monitors CIO Digital Freedom of Information Proactive Computer Malfunction Google Drive Workers Business Technology Chromebook Windows XP Society Cybercrime Google Calendar Printer Server Archive Displays Recycling Language User Error Access News Fun Web Server Time Management Heating/Cooling Samsung Download thin client Adminstration Cortana Technology Tips Messenger Unified Threat Management Spyware Fake News Web Design Taxes

Free Whitepaper

Sign up today for a FREE Whitepaper

Find out how your company can benefit from Managed IT Services today

Download

QR-Code