Microsoft Bulk Email

One of the more common non-technical questions we get from clients relates to methods and best practices for sending bulk emails.  Most solutions require you to send emails using your organization’s email domain which adds credibility but also comes with spam...

Strengthening Password Security

In today’s high-frequency cyber-attack landscape, protecting your passwords is paramount for strong cyber security. Recent concerns and data breaches have brought password managers into the spotlight. LastPass, a popular password manager, faced scrutiny due to a...

Data Security & Tech Recycling

The rise of ransomware attacks targeting small and medium businesses has made data security a top priority for IT leaders. While there are many security products available to protect and detect threats, one simple but often overlooked mitigation tactic is proper tech...

A Growing Concern: Data Loss

There are plenty of statistics out there about disaster recovery.  The Federal Emergency Management Agency (FEMA) says 65% of businesses fail within two years of a disaster, while the Small Business Administration (SBA) says it’s 90%.  That’s a wide range, but it...

A Growing Concern: Data Theft

Many businesses have spent the last several months worried about their short- and long-term survival due to the economic shutdown.  After companies deal with the immediate needs of working remotely and revenue preservation, however, it’s a great time to address some...

Remote Work Data Management

We’ve written before about the perils of data sprawl.  Even in normal times, no single person at most companies can list all of the places where sensitive company data lives.  Not only does this make it far more likely that your data will find its way into the wrong...

How SaaS Bolsters Security

It would be an understatement to say the software-as-a-service (SaaS) model has become the dominant one in the software industry.  This model (where you pay monthly or yearly for software instead of buying the license outright) is now being used primarily or...

Cybercriminals Getting Rich Off of COVID-19

The economic shutdown has led to millions of employees losing their jobs or receiving fewer working hours from their employers.  Employees who can do their jobs from home, however, are working more hours than they were before the shutdown. Unfortunately, that includes...

Cloud Services Considerations

Clearly, moving applications and data to the cloud is popular right now.  You don’t have to look any further than cloud providers’ financial results: Microsoft reported that quarterly revenue from its Azure cloud was up 73% year over year.  Amazon’s annual run rate is...

Biggest Data Security Risks

While all of the facts haven’t yet come to light, Tesla looks like it might be in a bad situation due to an employee’s actions.  This employee (who was disgruntled, concerned, or both) claims to have provided outside sources with proof that the company has installed...

Is Technology the Root of Your Problem?

Some problems are obviously technology problems.  When your email server is down, it’s pretty clear what needs to get fixed and who needs to fix it.  It’s not a “user problem” when the printer is jamming on every third page. Sometimes, however, it’s not as clear that...

Using Technology to Gain New Customers

Investing in technology is about more than keeping your network up and running.  When properly used, technology can help you achieve your primary business objectives – recruiting customers, recruiting employees, and designing a better product or service.  In the...

What is the “Hybrid Cloud?”

When cloud applications first started getting big, some technology experts were predicting that companies would move their entire technology stack to the cloud.  Even five years ago, Salesforce.com had revolutionized the way that many large businesses managed their...

Why is Office WiFi So Terrible?

Does your office WiFi drive you nuts?  Is the signal strength terrible, or does it periodically ‘blink’ out entirely?  Can it be made better, and if so, how much will it cost? Unreliable workplace WiFi is one of the most common business technology complaints. ...

What is Bitcoin?

The odds are pretty good that you’ve heard of Bitcoin.  The odds are also high that you heard about it because of two facts.  The first is that it is that ransomware encrypts, or locks, your files and requires that you pay in Bitcoin to unlock them.  The second (and...

Counterproductive Technology Changes

We recently wrote about server replacements, one area of technology where CEOs should be involved in the decision making process.  Another area where CEO’s should get involved: decisions that change the core, day-to-day software that your employees are using. That’s...

The Perils of Long-Term MSP Contracts

How confident are you that your company will have similar technology needs two years from now as it does today? Most small and mid-size businesses have little certainty around what circumstances they will face in two years’ time.  Despite this, there are all sorts of...

The Most Useful Keyboard Shortcuts

Keyboard shortcuts can save a few seconds here and there, but if you add that time up, the most productive ones can save you hours of your life.  Unfortunately, most keyboard shortcuts lists are full of complex shortcuts – it’s impossible to remember these...

Passphrase – The Less Frustrating Cousin of a Password

Computer passwords are a double-edged sword.  If you make it too complicated, you’ll forget it.  On the other hand, if you make it too simple, it’s relatively easy for anyone in the world to crack, and data theft is extremely common.  In fact, it’s so common that most...

Does Your Business Have a Social Media Policy?

Social media has become so prevalent that it’s rare to have an employee that doesn’t have an account on any service.  It’s also widespread across all age groups; in fact, a recent study found that Generation X spends 10% more time on social media each week than...

Technology’s Role in Change Management

Organizations have to periodically make major changes in processes.  While these changes are sometimes inspired by poor results, they are often inspired by changes in customer behavior or an increased competitive threat.  Whatever the reason, big changes aren’t to be...

 Technology and Risk Management

WingSwept spends substantial time making sure that each client’s technology is supporting their goals – for many clients, these goals include increasing efficiency, maximizing returns, and supporting future growth.  But one goal that all of our clients share is...

Ensuring Security Post-Employee Exit

Executives are well-versed in the threat of hackers, but the bigger danger lies in legitimate login misuse. What might not be as apparent is the more significant risk posed by individuals wielding legitimate login credentials to access sensitive data improperly. The...

Dropbox v. Enterprise-level BDR Solutions

A Summary of Recent ChannelPro Article “The Coming Convergence of File Sync and BDR.” Dropbox is a very popular program and in some ways, it does the same job as some backup systems out there. But, do industry experts think file syncing programs are viable...

Hard Drives – What’s the Difference?

Solid state drives (SDD) have become more and more prevalent in the computer world recently and have been receiving very positive reviews. But, what exactly is better about an SSD drive over my hard drive (HDD) and why is it more expensive for less space? The most...

Is Your Password Hacker-Proof?

With technology becoming more readily available to everyone, password safety has never been more important. This article by PCWorld illustrates just how crucial proper password protection can be.  Gawker Media is a widely known publication group that runs several blog...

Do not access PDF files from untrusted sources!

Do not access PDF files from untrusted sources! Adobe has recently outlined a number of security vulnerabilities affecting Adobe Reader and Acrobat. It is important for you to remember not to open unfamiliar or unexpected PDF files, particularly those hosted on...

Follow these steps and Improve Your PC’s Health

Although there is no definitive answer to the life span of desktop PC, WingSwept wants to provide you with some definite ways to increase your PCs performance and help extends its life. Emptying Temporary Internet Files periodically will help your PC’s overall...

Microsoft Outlook Email Tip – 2 Minute Delay

WingSwept is a local IT consulting company helping small to medium sized businesses leverage technology, minimize downtime, and secure business.  WingSwept has been delivering peace of mind since 1995, and focuses on businesses in Garner, surrounding areas in North...

Prevent Your PC Computer From Failure

Let your computer serve you longer by taking care of it.  Make sure it does not have unnecessary software on it, which take up space and may slow your PC down. If you are sure you don’t need a certain program anymore, you can go to your “Start” menu,...