Can phishing be prevented?

By John Merrey

Phishing is one of the most common online attacks. Last year 22 percent of attacks came through phishing, and if you’re not careful you could be a victim. This method of stealing someone’s data by spoofing a message from a legitimate company is an insidious trick that can be easier to fall for than you…

Read More

Where cloud data is stored

By Brandon Jackson

Even our storage is online now. With the rise of SaaS companies and many cloud storage solutions, everyone from the average consumer to the largest corporations in the world have moved their data storage to the cloud. But what does “the cloud” actually mean? What cloud storage is You’ve probably driven by a storage locker…

Read More

Can you work offline with Office 365?

By John Merrey

Office 365 is the latest edition of the popular Microsoft Office software, and it’s merged with online functionality to the point where you need an Internet connection for most tasks. But is it possible to work offline? How autosave works If you’re working on an online file in SharePoint or OneDrive, your changes will be…

Read More

Is a fingerprint less secure than a PIN?

By Brandon Jackson

Today’s smartphones and some computers have a variety of different methods that can be used to unlock them. Two of the most common are fingerprints (especially on newer and higher-end smartphones) and PINs. But which one is most secure? How fingerprint biometrics work When you’re logging into your phone with a fingerprint, you might think…

Read More

Does a small business need a server?

By John Merrey

More and more companies are switching to cloud solutions instead of having an on premise server, meaning one located in the same physical location as the business. So how can you tell when your small business actually needs a server? Or do small businesses ever need a server?

Read More

Is cloud storage secure?

By Brandon Jackson

Cloud storage is extremely popular today, and we’re big fans. People are using tools from DropBox to OneDrive to store their files. But in a business environment, one major concern is the security of cloud storage. Nothing about the cloud makes it any more or any less secure than any other file storage method.

Read More

What are cybersecurity threats?

By John Merrey

Cybersecurity is protecting yourself agains online threats. Here at TeamLogic IT, we focus on protecting entire environments against malicious parties getting in. A lot of layers and methods of protection go into that.

Read More

Password vs passphrase

By Brandon Jackson

One of the key layers of cybersecurity is good password hygiene. But today’s security can make the situation more complex. Now you have password managers, two factor authentication using apps, fingerprint protection, and even facial identification.

Read More

How phishing is accomplished

By John Merrey

It’s important to protect yourself from phishing scams. But what is a phishing scam? How is phishing accomplished in the first place?

Read More

How password authentication works

By Brandon Jackson

Ever wondered why most systems can’t tell you what password you used when you signed up? Or wondered if your password was being stored insecurely by a service you were using? How can you even tell if it’s stored securely, and what does that mean?

Read More