(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Why a Smartphone Might Not Be Such a Smart Idea

Tip of the Week: Why a Smartphone Might Not Be Such a Smart Idea

There’s no questioning that smartphones have done wonders for the world of business. Yet, some workers aren’t willing to adopt smartphones, and prefer their unbreakable nostalgia-filled flip phones.

Continue reading
0 Comments

Managing Your Computer Equipment Doesn’t Have to Be a Headache

Managing Your Computer Equipment Doesn’t Have to Be a Headache

Every business has hardware, like workstations, servers, and other devices, that are critical to its operational efficiency. However, managing your hardware can be tricky, especially if you’re a small or medium-sized business that has limited time and resources. If your business doesn’t have a process put in to place to handle hardware inventory and deployment, perhaps it’s time that you consider implementing one.

Continue reading
0 Comments

Microsoft Unveils New Windows as a Service Pricing Model

Microsoft Unveils New Windows as a Service Pricing Model

Is your business accustomed to paying for Windows operating systems up front? Microsoft’s latest “as a service” offering, Windows as a Service, might throw a wrench in your business model, but it could welcome shifts in your IT policy that ultimately allow for more flexibility on your part. Regardless, Windows as a Service provides businesses with the opportunity to reassess their approach to software solutions.

Continue reading
0 Comments

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

Tip of the Week: How to Set Up Two-Factor Authentication for Your Gmail Account

It’s not always easy to keep your accounts secure, but with two-factor authentication, it gets much easier. You might already be using it for a number of services, even if you don’t realize it. Usernames and passwords are fairly commonplace for securing digital accounts, but some require you to further prove your identity. We’ll show you how to do this with your Gmail account.

Continue reading
0 Comments

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

Continue reading
0 Comments

Tag Cloud

Security Technology Best Practices Privacy Internet Microsoft Tip of the Week Business Management Managed Service Provider Software Workplace Tips Cloud Backup Saving Money Data Small Business Hardware Gadgets Productivity Business Computing Mobile Office Hackers Business Email Quick Tips Hosted Solutions Google IT Services Malware Social Media IT Support Mobile Devices Upgrade Virtualization Business Continuity Users Passwords Smartphones Microsoft Office Network Windows WiFi Server Disaster Recovery Miscellaneous VoIP Computer Innovation Mobile Computing Vendor Management Communication Mobile Device Management Efficiency Operating System User Tips Unified Threat Management Windows 10 Marketing BYOD Smartphone The Internet of Things Apps Holiday Remote Computing IT Consultant Analytics Facebook Android Going Green Wireless Technology History Apple Alert Windows 8 Bring Your Own Device Health Saving Time Hard Drives Printer Lithium-ion Battery Ransomware Big data Tech Support Office Outlook Content Filtering Information Technology Collaboration Data Management Save Money Phishing Employer-Employee Relationship Gmail Remote Monitoring Network Security Firewall Spam Save Time Bandwidth Proactive IT Humor Hiring/Firing Smart Phones Best Practice Maintenance Tutorials Antivirus Browser Search Computer Repair Document Management Budget Internet of Things Avoiding Downtime Phone System Router Two-factor Authentication Money Wireless Computers Running Cable Fax Server Automation Administration PowerPoint Hacking Help Desk Excel User App Managed IT services Sports Current Events Mobile Device Intranet Business Intelligence User Error iPhone Education Presentation Risk Management Inbound Marketing communications Thin Client Comanaged IT Documents Compliance Statistics Streaming Media Retail Encryption Net Neutrality Pain Points Printer Server Website Networking Gaming Console Virtual Desktop Network Congestion Digital Payment Customer Relationship Management Experience End of Support Social Networking Artificial Intelligence Bluetooth Heating/Cooling Laptop Computer Accessories Comparison Augmented Reality Legal Data storage Text Messaging Safety Company Culture VPN Cost Management Social Flexibility Virus Office Tips Customer Service Downtime Computing Government Recovery Cybercrime Password Chrome Programming Hosted Solution IBM SaaS Hacker Music Video Surveillance Wi-Fi Processors Upgrades Online currency Trending Best Available Point of Sale Flash IP Address Black Market Storage Debate Telephone Systems Human Resources Deep Learning Read Value Settings Keyboard LiFi Business Growth Lifestyle Leadership External Harddrive Monitors PDF Adroid Language Shortcut Visible Light Communication Google Wallet Troubleshooting Displays organize BDR File Sharing Managed IT Advertising Webinar Domains Drones Business Owner Touchscreen eWaste YouTube Co-Managed IT Work/Life Balance Law Enforcement Specifications Writing Environment Outsourced IT LinkedIn Competition Unified Communications Wearable Technology GPS Office 365 Entertainment Staffing Analytic Mouse Riske Management Operating Systerm Microserver switches Application Permissions Digital Signature 3D Paperless Office Google Docs Disaster Regulations Turn Key Solid State Drive Display Ebay Identity Theft DDoS Securty USB Efeciency IT consulting Society Content Management Tablet Pirating Information Virtual Reality Micrsooft Recycling Harddrive IT service Adminstration Word Windows XP Public Speaking HIPAA Archive Skype Computing Infrastructure Cortana Robot Electronic Payment CIO Update Teamwork Memory Entrepreneur

Mobile? Grab this Article!

QR-Code

Recent Comments

No comments yet.

Blog Archive