SolutionOne Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

Tech Term: Opening the Spam Folder

Posted by on in Security

b2ap3_thumbnail_spammity_spam_400.jpgSpam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve deep into the different kinds of spam out there, as well as theorize where the term even came from.

Tagged in: Email Spam Tech Term

b2ap3_thumbnail_What_Qualifies_as_Disaster_400.jpgWhat one organization considers a disaster might be much different than what another business might see as disastrous. Perhaps one sees the loss of a few hours and a few files as something that can be recovered, while another sees every lost moment and each iota of data as a catastrophe. Whichever camp you find yourself in, you need to be able to do two things: first, gauge how serious a given data loss disaster is, and secondly, establish what must be done to get back in action following said disaster.

Where There’s Data Loss, There’s Trouble

Posted by on in Security

b2ap3_thumbnail_where_there_data_loss_400.jpgData loss can have lasting effects upon your business, usually measured in lost productivity and capital. In other words, data loss is often measured by the cost required to retrieve, restore, and/or repair its effects. Of course, this is only the beginning of how data loss can impact your operations.

b2ap3_thumbnail_server_proxy_intro_400.jpgThere are plenty of technical terms and solutions that, while heard of frequently enough, it may not be completely clear what they mean or refer to. A proxy server is an excellent example of such a solution. This week, we’ll examine this tech term and review how utilizing proxy servers can help your business.

b2ap3_thumbnail_mobile_devices_400.jpgMobile devices are so common nowadays that you’ll likely encounter your employees bringing multiple devices to the office on a regular basis. Little do they know that everything they bring with them, from their Fitbit to their laptop, poses a security threat. Of course, the threat level from each individual device will depend on what it is exactly, but the point stands that the less you do about mobile device security now, the more danger your organization will be in down the road.


Tag Cloud

IT Management Downtime VoIP Software Tips Technology Outsourced IT Office 365 eBay The Internet of Things Access Control Macro Holiday Typing SaaS Windows 10 Knowledge Online Currency Google Docs Cybersecurity Mobile Device Management Windows 8 Undo Social Engineering Server Monitors Computer Repair Augmented Reality Corporate Profile IT Support How To Identity Remote Monitoring VPN Text Messaging Twitter Word People Facebook Settings Outsourcing Analyitcs Blockchain Vendor Management Crowdfunding Social Superfish Cameras Backup Data storage Quick Tips Innovation Data loss Virtual Reality IBM Trainging Government IT Consultant Tracking Money IT budget Humor Help Desk Safety Business Owner Efficiency 3D Printing Apple Chrome Internet of Things Alert Alt Codes Analytics Printer Time Management Break Fix Education Service-based Business Content Filtering Fraud Inbound Marketing Data Management Budget Chromebook Solid State Drive Work/Life Balance Laptop Windows Business Intelligence Administrator Digital Payment Permissions Experience Miscellaneous Regulations Save Money Website WannaCry Writing HIPAA IT Solutions Legislation Office Tips Migration iPhone Botnet Business Management LinkedIn Microsoft Excel Business Continuity Memory Operating System Address Computers Black Market Social Media CrashOverride Maintenance Cryptocurrency Programming Android Bring Your Own Device Infrastructure Social Networking Telephone Systems Storage Servers Relocation Microsoft Staffing Consumers Gadget Business SharePoint Saving Time DIY Hacker Disaster Virtualization LiFi Electronic Medical Records GPS Best Practice Google Calendar Buisness Disaster Recovery Hacks IT Services Health Cabling Web Server Proactive IT Managed Service Provider User Productivity PowerPoint Scary Stories Spyware Smartphone Privacy Big Data Printing Cleaning BYOD Trending virtual private network Workplace Tips Recovery Outlook Legal IP Address Users Computer Wearable Technology Scam Computer Accessories Mouse Phishing staff Firefox Busienss Computing Email Browser Lenovo Drones YouTube Digital Training Bandwidth Leadership Notifications Application Compliance Fun Touchscreen Patch Management Best Practices Multi-Factor Security Data Communication Office Artificial Intelligence Websites Video Surveillance 5G Spam Start Menu Public Speaking G Suite Domains Alerts User Tips User Error Firewall Motion sickness Phone Systems Google Robot Google Drive Microsoft Office Business Growth Skype Physical Security Vulnerability Save Time eWaste Wi-Fi Running Cable Webinar Data Backup Unified Communications Shortcut Charger Display Secruity Conferencing Best Available Hosted Solutions Black Friday Mobile Data Security Webcam Networking Web Marketing Dark Web Processors Current Events Scheduling Collaboration Network Marketing Travel Password Excel Tip of the Work Automation Upgrade Virtual Desktop Security Crowdsourcing Tech Term Software Employer-Employee Relationship Two-factor Authentication Mobile Technology Hardware Battery Gadgets Lithium-ion Battery Paperless Office Remote Computing Apps Refrigeration Mobile Security Managed IT services Gmail Unified Threat Management Business Computing Entrepreneur Presentation Tools Upgrades Mobile Devices Bitcoin Meetings Small Business Virus Gaming Console Downloads Company Culture Tech Support Antivirus Customer Relationship Management 3D Congratulations Wireless Specifications Uninterrupted Power Supply Private Cloud Applications Bluetooth Thank You Hackers Computer Care Tutorials Debate Taxes Business Technology Mobile Computing Streaming Media Hard Drives Language Search Mail Merge Competition Personal Information Hotspot Law Firm IT Malware Supercomputer Mobile Device Comparison Cybercrime IT service Sports iPhones Unsupported Software Politics Phone System IT Technicians Saving Money Google Maps Environment Halloween Mobile Office Smart Technology PC Care Windows 8.1 Update Avoiding Downtime Information Technology File Sharing Data recovery Encryption Hacking Hosted Solution WiFi Troubleshooting Error Hiring/Firing Deep Learning communications Fax Server CCTV BDR Network Management cooperation Point of Sale History Server Management Administration Emergency Ransomware Distributed Denial of Service Chatbots User Tip Cloud Computing Automobile End of Support Customer Service Heating/Cooling Network Security MSP Smartphones Passwords Cyber Monday Document Management Computing Tip of the Week Retail Computing Infrastructure Cloud Network Congestion Dark Data Food Tablet Cortana Going Green Emoji Mobile Data Piracy USB Managed IT App Statistics Identity Theft Net Neutrality Machine Learning Google Wallet Samsung Risk Management Hard Disk Drive Internet Wireless Technology Licensing Law Enforcement Nanotechnology

Latest Blog Entry

Tech Term: Opening the Spam Folder
Spam is a tricky subject to talk about, as it seems everyone has a different definition for it. Yet, most have come to the conclusion that spam is a bad thing. For today’s Tech Term, we want to delve...

Latest News

Book Your Domain Name

webSolutionOne Launches New Domain Registration Site

Find your perfect domain name in minutes with our name suggestion tool.  Visit www.s1host.com to get started!


Contact Us

Learn more about what SolutionOne can do for your business.


Call us today    214-299-8555

  facebook  twitter  linkedin Subscribe to our blog