Contact us today!
(518) 203-2110

Evolve IT Blog

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways to Keep Your Internet Browsing Private

b2ap3_thumbnail_anonymous_browsing_400.jpgIt turns out that the Internet isn’t as anonymous as it seems. This is a hard lesson learned by more than 37 million users of Ashley Madison, a website dedicated to cheating on one’s spouse. In July, the site was hacked by the hacker group, “The Impact Team,” and they’re currently threatening to expose the cheaters by going public with the database. In this particular case, Ashley Madison users should have known better--on two levels.

Continue reading
0 Comments

20% of Visits to Pornographic Websites Originate From Office Workstations

b2ap3_thumbnail_content_filtering_400.jpgWith all of the inappropriate content festering in the gutters of the Internet, you need a solution that will protect you, your family, and your office. Implementing a content filtering solution is a great start, but it’s not going to shield you 100 percent from what’s out there. In addition to having a content filter, you need to take an active role in monitoring who’s doing what on the Internet.

Continue reading
0 Comments

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Google Hosted Solutions Microsoft Upgrade Computer Efficiency Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Network Security Ransomware Hardware Business Continuity Disaster Recovery Communication Hacking WiFi Operating System Facebook The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Apps Website Network Managed Service Provider Outlook Employer-Employee Relationship Two-factor Authentication History Wireless Technology Android Small Business Phishing Apple App Best Practice Mobile Computing communications Big Data Safety Smartphones Alert Unified Threat Management Networking Quick Tips Data storage Data Windows Experience Firewall Content Filtering Cybercrime Mobile Device Management Money Deep Learning Business Growth Data Management Recovery BDR Competition Robot Advertising Entrepreneur Society Sports Presentation Domains Vendor Management Google Wallet Spam Running Cable Information Technology Windows 8 Internet of Things Hacker Monitors Hosted Solution Windows XP IT Services Documents Application Artificial Intelligence Tech Support Compliance Customer Service Displays Drones Social Router Printer Browser Wireless Office 365 End of Support Virtual Desktop Unified Communications Securty Document Management Saving Money Encryption Analytics VoIP Lithium-ion battery Writing Law Enforcement intranet SaaS Proactive IT Cortana Network Congestion Social Networking Save Money Public Speaking Virtualization Music IP Address Retail Cryptocurrency Laptop Government Keyboard IBM Augmented Reality Search Managed IT services User Google Docs Education Cleaning Holiday Hard Drives Shortcut Black Market YouTube Processors Remote Computing Staffing DDoS Bluetooth Office Tips LiFi BYOD Downtime Heating/Cooling Word Automation Passwords Streaming Media Help Desk Disaster Memory Micrsooft Visible Light Communication Business Management
QR-Code