Contact us today!
(518) 203-2110

Evolve IT Blog

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: 5 Ways to Keep Your Internet Browsing Private

b2ap3_thumbnail_anonymous_browsing_400.jpgIt turns out that the Internet isn’t as anonymous as it seems. This is a hard lesson learned by more than 37 million users of Ashley Madison, a website dedicated to cheating on one’s spouse. In July, the site was hacked by the hacker group, “The Impact Team,” and they’re currently threatening to expose the cheaters by going public with the database. In this particular case, Ashley Madison users should have known better--on two levels.

Continue reading

20% of Visits to Pornographic Websites Originate From Office Workstations

b2ap3_thumbnail_content_filtering_400.jpgWith all of the inappropriate content festering in the gutters of the Internet, you need a solution that will protect you, your family, and your office. Implementing a content filtering solution is a great start, but it’s not going to shield you 100 percent from what’s out there. In addition to having a content filter, you need to take an active role in monitoring who’s doing what on the Internet.

Continue reading

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Cloud Hackers Email Privacy Productivity Business Malware Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Computer Workplace Tips Google Smartphone Windows 10 IT Support Mobile Devices Innovation Gmail Hardware Network Security Ransomware Office WiFi Facebook Operating System The Internet of Things Social Media Bandwidth Microsoft Office Backup Apps Business Continuity Disaster Recovery Communication Hacking Managed Service Provider Employer-Employee Relationship Outlook History Two-factor Authentication Small Business Smartphones Phishing App Wireless Technology Android Mobile Computing Apple Big Data communications Safety Unified Threat Management Best Practice Quick Tips Alert Networking Data storage Data Windows Firewall Experience Content Filtering Cybercrime Website Mobile Device Management Money Network Application Google Wallet Spam Information Technology Customer Service Running Cable Writing Windows 8 Internet of Things IT Services Hosted Solution Windows XP Artificial Intelligence Documents Router Tech Support Office 365 Compliance Drones Social Analytics Saving Money intranet Retail Printer Lithium-ion battery Browser Wireless Virtual Desktop Unified Communications Securty Social Networking Managed IT services Document Management Encryption Public Speaking VoIP Law Enforcement SaaS IP Address Virtualization Bluetooth Proactive IT Cortana Government Network Congestion Automation Save Money Augmented Reality Keyboard Memory Music Search User Hard Drives Deep Learning Cryptocurrency Remote Computing Laptop Shortcut IBM BDR DDoS Education Heating/Cooling Word Google Docs Vendor Management Cleaning Holiday Processors Black Market YouTube LiFi Staffing Business Management Office Tips Monitors BYOD Downtime Help Desk Passwords Streaming Media Competition Visible Light Communication Presentation Disaster Entrepreneur Micrsooft Displays Domains Business Growth Data Management Advertising Hacker Recovery Robot End of Support Society Sports