Month: October 2014

Daylight Savings Time will end this year on Sunday, November 2, 2014. Aside from the extra hour of sleep and the evening commute in darkness little will change for the business world. Almost all technological devices – from the smartphone whose alarm you depend on to your workstation computer, should automatically update its internal clock

The productivity suite is the beating heart of the day-to-day activities of many businesses. A person’s work is only as good as their tools allow them to be, and the competition between Microsoft and Google to offer the best toolbox is to the benefit of users on both sides of the fence. Microsoft’s Office 365

Finally – IT Support That’s Responsive, Knowledgeable & Timely! When technology issues occur, there’s no time to waste because wasted time equals wasted money. CTECH Consulting Group understands how valuable your time is. Our helpdesk service professionals are everything you’ve always wanted – responsive, knowledgeable, and timely. Choose your way to contact us via email, phone, portal,

Protect Your Technology Against the Inevitable Threats of the Future! How does CTECH Consulting Group’s team of IT security experts keep you safe and secure against any threat the future holds? Here’s a few ways: Email Security We’ll analyze your email to search for any weak points and vulnerabilities that may result in malware or virus infections.

Make Your Workforce MORE Mobile Than Ever Before! We believe your IT should help you get work done faster, more efficiently, in more places. A modern business lives and breathes outside of the office; so go ahead, start embracing the new way of using information technology! We’ll help you mobilize your IT: Harness the power

Constant Planning & Improvement to Make IT Work for YOUR Business! CTECH Consulting Group believes you deserve better than constant IT struggles. We’re not a “fix it as it breaks” IT company – we’re an entire IT department that keeps you prepared & creates a long-term IT strategy that makes sense for YOUR business. IT Leadership We’ll

Your sensitive data is the foundation of your business, but unfortunately, your data is constantly at risk – from natural disasters to human errors to malicious intent, many businesses have experienced some form of data loss; and the latest form of ransomware strives to steal and encrypt as much data as possible. Introducing CryptoWall 2.0:

Less Than 300 Days to Upgrade or Face Significant Security Threats & Noncompliance Fines! Windows Server 2003 is joining Windows XP in the operating system graveyard come July 15, 2015. As the server platform draws closer to its End of Life it is apparent that, like the EOL debacle surrounding Windows XP, many businesses will

CryptoWall, a dangerous form of ransomware that’s similar to CryptoLocker, infiltrates users’ computers and encrypts their files, then demands a ransom fee for the decryption key. So how does the ransomware infect computers? Well, there’s a few ways: Spam emails with malicious links/attachments. Drive-by download attacks from infected websites. Various other forms of malicious activity.

Microsoft Excel is a tool most of us use but few of us truly understand. From client lists to call sheets, purchase orders to audits, almost every business person has some use for the data management tool that is Excel. Here are six basic tips that can help you get around Excel with greater efficiency