Contact Us Today!(978) 988-5500
  

Casserly Consulting L.L.C. Blog

Welcome to our blog, full of IT tips and business technology best practices

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Tip of the Week: A Secure 2018 Relies on Powerful Passwords

Password security is one of the most important parts of using an online account. It seems that the average user runs into the paradox of password security by using either complex, hard-to-remember passwords, or simple and less-secure passwords that put their accounts at risk. Even if the user is aware of the benefits that come from using a secure password, chances are that they will sideline security in favor of ease of access.

Continue reading
599 Hits
0 Comments

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

ALERT: Meltdown/Spectre Hardware Vulnerability Requires Action

Just a few months after finding themselves in a firmware fiasco, Intel is making news for all the wrong reasons. This issue had the potential to affect the CPU of a device, causing a severe dip in the performance of the device.

Continue reading
388 Hits
0 Comments

Personalities are Key to Successful Networking

Personalities are Key to Successful Networking

Almost everyone has, at one time, worked with someone with whom their personality clashed, whether they did not get along or just didn’t work effectively together. While this is a perfectly natural phenomenon of both nature and nurturing, it is best to put personal differences aside when forming a professional relationship with a coworker.

Continue reading
427 Hits
0 Comments

Tip of the Week: 5 Handy Android Shortcuts

Tip of the Week: 5 Handy Android Shortcuts

With business becoming more and more mobile, there is a greater need for the devices we use to offer features that allow the user to boost efficiency and avoid downtime. It just so happens that Android devices come with a few little-known ways to accomplish these goals. For this week’s tip, we’ll go over a few ways your phone can be used more efficiently.

Continue reading
413 Hits
0 Comments

Using Cortana Gets Better with Customization

Using Cortana Gets Better with Customization

As Cortana has more and more added to its functionality, it gradually becomes more of a utility to all. Those who prefer to use Google’s applications are now able to use Cortana to augment their use of Gmail, Google Contacts, and Google Calendar. Today, we’ll go through how you can set these programs up to play nice with Cortana.

Continue reading
442 Hits
0 Comments

Can Chargers Be Interchanged Between Devices?

Can Chargers Be Interchanged Between Devices?

One of the major benefits of a laptop is the mobility that it permits--but this is a double-edged sword, as this mobility means that you are relying on the device’s battery life. Of course, if your laptop begins to die, you can always borrow someone else’s charger, right?

Continue reading
476 Hits
0 Comments

Tip of the Week: How to Type Accent Marks and Symbols

Tip of the Week: How to Type Accent Marks and Symbols

When it comes to businesses-to-business relationships, the global impact of the Internet has unlocked quite a few doors. Rather than developing relationships with exclusively businesses in their region, it’s not uncommon for a small manufacturer of model airplanes in Iowa to use the web to find the vendor that can meet all of their needs, even if they’re located in Austria. Doing business internationally means there may be an occasion where you’ll need to communicate in another language. Fortunately, for Windows 10 users, it has never been easier to switch your computer or mobile device’s language.

Continue reading
491 Hits
0 Comments

Do You Use 2FA? If So, You’re in the Minority

Do You Use 2FA? If So, You’re in the Minority

Two-factor authentication, also known as 2FA, is a very beneficial addition to consider for your cybersecurity. However, a research study unearthed a few surprising takeaways that indicate that 2FA may not be adopted as much as one might expect it to be.

Continue reading
536 Hits
0 Comments

11 Ways to Enhance Android Security

11 Ways to Enhance Android Security

It should come as no surprise that hackers are always trying to get ahead of security developers, just as it should be no surprise that these hackers often target the Android operating system. After all, the Android OS is used on mobile devices all over the world. If your business leverages these devices, there are quite a few security considerations you need to keep in mind.

Continue reading
557 Hits
0 Comments

Tip of the Week: Is OneNote or Evernote Better for Your Needs?

Tip of the Week: Is OneNote or Evernote Better for Your Needs?

The ability to take notes is invaluable to business, but the ability to take cohesive, well-organized notes is essential. Therefore, it is important to utilize a solution that enables you to do so. For this week’s tip, we’ll compare and contrast two note-taking applications -- Microsoft OneNote and Evernote -- to evaluate which will better serve your needs.

Continue reading
591 Hits
0 Comments

Technology Has Influenced a Few Holiday Traditions

Technology Has Influenced a Few Holiday Traditions

Everyone has their own holiday traditions, and Christmastime is no exception. Some might stick to more traditional roots, while others focus on more contemporary trends to create a Christmas culture that changes with each passing year. Many of these newer traditions have been molded from modern technology solutions, so let’s celebrate both new and old holiday traditions by looking at how technology has changed them.

Continue reading
538 Hits
0 Comments

Amazon Has Taken Over the Cloud

Amazon Has Taken Over the Cloud

Amazon Web Services, or AWS, has long been a provider of quality web-based applications and services for businesses of all shapes and sizes. Nowadays, AWS is providing more services than ever before for the business world with more offerings regarding video creation, augmented reality, and virtual reality. With these new cloud-based services, Amazon is hoping to take advantage of a new market for emerging technologies.

Continue reading
461 Hits
0 Comments

Tip of the Week: Sync Your Inboxes with IMAP

Tip of the Week: Sync Your Inboxes with IMAP

How many emails do you send on a daily basis? You use it so frequently that you might not second-guess how it actually works. Depending on the way your business uses email, you might be able to optimize the way that it works for your mobile devices. There are two types of protocol that work to varying degrees for your email solution.

Continue reading
467 Hits
0 Comments

Does Credit Card Theft Mean Identity Theft?

Does Credit Card Theft Mean Identity Theft?

Almost anyone would consider having their credit card stolen a major problem, but while it may technically constitute identity theft, identity theft itself can be any number of things. Today, we go over the difference between credit card theft and identity theft and what you can do to keep your staff, clients, and vendors safe.

Continue reading
655 Hits
0 Comments

VoIP Delivers Benefits That a Traditional Phone System Can’t

VoIP Delivers Benefits That a Traditional Phone System Can’t

Communication is a critical part of your business’ operations, but how can you ensure that you’re not holding your business back by failing to consider modern solutions to age-old problems? While your telephone system likely gets the job done, you shouldn’t let complacency keep you from striving for improvement. For telephony solutions, you can consider leaving behind your service provider and investing in a digital solution called Voice over Internet Protocol, or VoIP.

Continue reading
553 Hits
0 Comments

Tip of the Week: Would Remote Workers Benefit Your Business?

Tip of the Week: Would Remote Workers Benefit Your Business?

If you allow your workforce to work remotely, your business can flourish under the right conditions. You still need to think about the risks associated with it, though. If you’re not careful about your remote work strategy, it could blow up in your face. Here are some of the ways you can minimize the risk of remote workers.

Continue reading
456 Hits
0 Comments

Which Approach Puts Your IT in a Better Position?

Which Approach Puts Your IT in a Better Position?

Technology management is one of the major issues that challenge small businesses. Do you know the various strengths and weaknesses of having an in-house IT department versus an outsourced IT provider? As a managed service provider ourselves, we’re in a unique position to help your business make an educated decision about the future of its IT management.

Continue reading
377 Hits
0 Comments

5 Security Analogies to Help You Better Understand Hacking

5 Security Analogies to Help You Better Understand Hacking

How often do you read a blog article about network security only to be blown away by all of the overly complicated and confusing jargon of the industry? We know that it’s not necessarily your specialty, but it’s still important that you understand how network security works for your organization. While the complicated details should be left to IT professionals, we can help you better understand the general idea of security by comparing it to a locked door.

Continue reading
600 Hits
0 Comments

Tip of the Week: Saving a Windows Product Key to a Microsoft Account

Tip of the Week: Saving a Windows Product Key to a Microsoft Account

To activate Windows 10, every user will need a product key. Every legitimate version of the software has one, but often times, users will need the product key later down the road, only to find that they’ve lost it or tossed it. For this week’s tip, we’ll describe a way to link your software’s product key to a Microsoft account so that you’ll never lose it again.

Continue reading
426 Hits
0 Comments

BDR Needs to Be a Business Priority

BDR Needs to Be a Business Priority

Of any of your business implementations, a data backup and disaster recovery system is a serious contender for the most important. However, many neglect to prepare for a data loss event or disaster, which means they leave their business vulnerable to the ill effects of both. Protecting your business begins with a data backup and disaster recovery solution that prepares you for a worst-case scenario.

Continue reading
526 Hits
0 Comments

Latest Blog Entry

The Now: It’s the holiday season, which means that many will find that themselves traveling, either to visit family and friends or to seek out more agreeable climates. However, bus...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce our new website at Casserly Consulting L.L.C.!

Read more...

Contact Us

Learn more about what Casserly Consulting L.L.C. can do for your business.

callphone

Call us today    (978) 988-5500

19 Crosby Drive
Bedford, Massachusetts 01730

Copyright Casserly Consulting L.L.C.. All Rights Reserved.