Login 

SolutionOne Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_browser_tab_green400.jpgEveryone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

b2ap3_thumbnail_Alert_Blog_400.jpgA major vulnerability has been discovered that affects everyone that uses Wi-Fi. Key Reinstallation Attack, or KRACK, affects the core encryption protocol that most Wi-FI users depend upon to shield their browsing from others, Wi-Fi Protected Access 2 (WPA2).

Tagged in: Alert Vulnerability WiFi

b2ap3_thumbnail_circut_face_darkoverlord400.jpgStudents generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

b2ap3_thumbnail_data_breach_defined400.jpgConsidering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

b2ap3_thumbnail_Wordlogo400.jpgMicrosoft Word has long since established itself as the primary word processing software in the business world, but even some power users don’t necessarily know about all of the hidden features that exist in it. Here are three of the best Word capabilities that you’ll be sure to use next time you’re in a pinch.

Categories

Tag Cloud

Congratulations Google Maps Skype Buisness Work/Life Balance Cabling Cortana Environment Antivirus Proactive IT Paperless Office Government Virus Touchscreen Outsourcing Staffing IP Address Emoji Computer Tools Tablet Servers Computer Repair Scam Thank You Windows 10 Company Culture Digital Wi-Fi MSP Best Available Competition Text Messaging Cloud Windows 8 Phishing Busienss Computing Productivity Infrastructure Gaming Console Drones PC Care Printer Cameras Marketing Email Scary Stories IBM Software Tips Unified Communications Halloween Hackers Webinar Law Enforcement Cryptocurrency Encryption Tip of the Work Notifications Licensing Charger Physical Security Domains CrashOverride Collaboration WiFi Automobile Mouse Mobile Office Upgrades Crowdfunding Meetings Digital Payment GPS Managed Service Provider Small Business Internet of Things Risk Management Downtime Experience Windows Webcam Privacy Chrome virtual private network Holiday Hard Disk Drive Piracy Application IT Services Passwords Network Security IT budget Law Firm IT Legal Writing Excel Budget Unsupported Software Twitter Troubleshooting Best Practice Safety How To Google Drive Hacking Outlook Google Docs Sports Server Management Virtual Desktop Cleaning Specifications Website Automation Hard Drives Analyitcs Gadget Lenovo Internet Point of Sale Solid State Drive Cloud Computing Augmented Reality Virtualization Apps BYOD Big Data CCTV Search Trainging Cybercrime Unified Threat Management Politics Smartphones Content Filtering Patch Management Business History Hosted Solutions Information Technology File Sharing Hacker Phone System Emergency Network Corporate Profile Hiring/Firing Black Market Mobile Technology User Inbound Marketing Spam Public Speaking Food Maintenance eWaste G Suite Computer Care Motion sickness End of Support Monitors DIY Outsourced IT Gmail Networking Cybersecurity Workplace Tips Shortcut Spyware Managed IT services Backup Nanotechnology Going Green Leadership Server Address People Superfish Fun Data recovery Display Upgrade SaaS Save Money Innovation Office Tips Virtual Reality Google Tech Support Customer Service Ransomware Running Cable Service-based Business Streaming Media Data Security Settings Help Desk Two-factor Authentication Efficiency Knowledge Mobile Device Business Growth Typing LinkedIn App Training Wireless Alert Communication Business Technology Best Practices Online Currency Google Wallet Disaster Recovery Wireless Technology Gadgets VPN Office Dark Data Business Management Mobile Computing Personal Information Business Continuity Money Recovery Firefox User Tip User Tips Presentation Social Machine Learning Telephone Systems Artificial Intelligence Private Cloud Identity Theft Tip of the Week VoIP Document Management Miscellaneous Mobile Mail Merge Supercomputer Web Server Business Intelligence Samsung Chromebook Remote Monitoring Network Management Computer Accessories IT service Statistics Computing IT Management Current Events Time Management Word Health Business Computing Saving Time Deep Learning Malware Password Analytics Secruity Heating/Cooling Browser Scheduling Vendor Management Tracking Lithium-ion Battery Remote Computing Employer-Employee Relationship Office 365 PowerPoint WannaCry Save Time Video Surveillance User Error Electronic Medical Records Smartphone 3D Printing iPhones Fax Server Trending Bitcoin Relocation Debate Managed IT Phone Systems Android Bring Your Own Device Hacks Web Marketing IT Solutions Vulnerability BDR Retail Storage Network Congestion YouTube Security eBay Botnet Data storage Humor Technology Microsoft Software Disaster Avoiding Downtime Data Management Macro Laptop Quick Tips Alerts Net Neutrality Start Menu Administration USB Refrigeration Administrator Conferencing Users Undo Windows 8.1 Update Crowdsourcing Printing Alt Codes LiFi IT Consultant Processors Bluetooth Tutorials Battery communications Robot Computers Entrepreneur Social Engineering Memory Uninterrupted Power Supply Operating System Firewall Error Mobile Device Management Wearable Technology Taxes Social Networking Data loss Facebook Apple Microsoft Office Mobile Data Saving Money Mobile Devices The Internet of Things Business Owner Hosted Solution Data Backup 5G 3D Education Hardware IT Support Customer Relationship Management Travel Bandwidth Consumers Social Media Websites iPhone Programming Data

Latest Blog Entry

Tip of the Week: Closed a Tab Accidentally? Here’s How to Restore It
Everyone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, ...
Read more...

Latest News

Book Your Domain Name


webSolutionOne Launches New Domain Registration Site

Find your perfect domain name in minutes with our name suggestion tool.  Visit www.s1host.com to get started!

 

Contact Us

Learn more about what SolutionOne can do for your business.

callphone

Call us today    214-299-8555

  facebook  twitter  linkedin Subscribe to our blog