(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Recent blog posts

b2ap3_thumbnail_prosecutors_powerpoint_400.jpgAre you a master of making brilliant Microsoft PowerPoint slideshows to augment your presentations? You’re not the only one; it’s widely known as one of the best mediums to create a compelling, professional slideshow. It’s used in classrooms, training sessions, and much more. However, there’s one profession where PowerPoint’s effectiveness is questionable: A prosecutor in a court case.

Continue reading 0 Comments

b2ap3_thumbnail_do_it_now_400.jpgTwelve years after its release, Microsoft has scheduled to end mainstream support for Windows Server 2003 on July 14, 2015. This move essentially pulls the plug on the popular operating system, leaving any business using the server OS after its end-of-support date vulnerable. If your organization is still running this outdated OS, you need to update ASAP.

Continue reading 0 Comments

b2ap3_thumbnail_superfish_one_400.jpgNormally, you can trust the software that comes preinstalled on a new computer. Unfortunately, this isn’t the case with the shopping-search app Superfish, which came installed on every Lenovo device sold between September and December 2014. If you’ve got the Superfish app on your computer, then you need to remove it before it does some superbad damages. Here’s how you do it.

Tagged in: Hackers Malware Security
Continue reading 0 Comments

b2ap3_thumbnail_outlook_mail_400_20150220-055732_1.jpgOne of the best reasons to use Microsoft Outlook is the little-known Quick Steps feature. With Quick Steps, you can apply multiple actions at the same time to your email messages. Users that feel bogged down by their inbox will especially appreciate this email management tool.

Continue reading 0 Comments

b2ap3_thumbnail_anthem_hack_400.jpgThis month saw one of the largest recorded data breaches ever, when healthcare-provider Anthem experienced a hack causing data belonging to more than 80 million of its patients to be exposed. This includes sensitive information like Social Security numbers, dates of birth, email addresses, and more. How can you protect yourself from a hack like this?

Tagged in: Data HIPAA Security
Continue reading 0 Comments

Tag Cloud

Comanaged IT Money Customer Relationship Management Teamwork Social Networking External Harddrive VPN USB Harddrive Smartphones Help Desk LinkedIn Update Business Computing Smart Phones Saving Money Microserver Thin Client Hackers User Antivirus Company Culture Apple Debate Virus Gaming Console Skype Apps Microsoft Automation Users Remote Computing Net Neutrality Computers Mobile Device Business Intelligence Education Chrome Managed Service Provider Big data Streaming Media Alert Firewall Mobile Devices Wearable Technology Miscellaneous Router Current Events Windows Remote Monitoring Cloud Workplace Tips IBM Google Communication Hosted Solutions User Tips Technology IT Services Mouse Downtime Security Office Best Practices Health The Internet of Things IT Consultant VoIP Text Messaging Pirating Information Network Congestion Content Filtering Excel Digital Payment Proactive IT Thank You Computer Accessories Touchscreen Value IT Support Best Available Lithium-ion Battery Display Avoiding Downtime Inbound Marketing Augmented Reality Laptop Computer Internet Mobile Computing Data Management Save Time Recycling Administration Operating Systerm WiFi Comparison Congratulations BDR Co-Managed IT Turn Key Spam Mobile Office Point of Sale Hardware Pain Points Running Cable Intranet Windows 10 Microsoft Office Fax Server Efficiency File Sharing Lifestyle Adminstration Software Operating System Bring Your Own Device Video Surveillance Social Media Marketing Tutorials Tech Support Trending Sports Printer Server iPhone Quick Tips Analytics Analytic Unified Threat Management Server Android History Online currency Business Hiring/Firing Digital Signature User Error Data Gadgets Computer Repair Backup Productivity Information Technology Bluetooth Efeciency Business Continuity Tip of the Week Adroid Outlook Webinar Cost Management Search Statistics Maintenance Innovation Mobile Device Management HIPAA Disaster Recovery Browser Webcam Vendor Management Email PowerPoint Facebook Hard Drives Content Management Tablet Network Presentation GPS Business Management Passwords Save Money Printer Smartphone Wireless Technology Risk Management Collaboration Small Business Read Virtualization BYOD Phone System Saving Time organize Privacy Malware 3D Archive Ebay Windows 8 Document Management Programming Leadership Humor Holiday App Going Green Upgrade Riske Management

Mobile? Grab this Article!


Recent Comments

No comments yet.

Blog Archive