Blog

Hackers, What Do They Look for?

Network: How to protect it? Thinking like a hacker every once in a while can help your organization security. What do you think they look for and what are the easiest mistakes for them to exploit to get onto your ...

3 Most Dangerous Mobile Security Risks

Mobile Security: What do you need to know about? Now a day we are able to download a variety of apps, some of them are great apps that can even help you to transform your mobile into an on the go ...

Is Your Mobile Device Your Weakest Security Link?

Network security: don't let your mobile devices become your biggest risk! Today’s world has made our mobiles our best friends, partners, etc. Bringing our own phones and tablets into the workplace. This trend is causing a network security nightmare for ...

5 great benefits of Remote Monitoring and Maintenance

Remote Monitoring and Maintenance – What is it? Remote Monitoring and Maintenance is watching your technology all the time. While keeping an eye on your network and servers to get a perspective on the overall status of your technology. This ...

Office 365: Reshape Your Business with it!

Office 365: Is it time to transform your Business? Office 365 offers you the ability to reshape the way your business operates. As a business owner, you can reshape your workforce ...

OneNote for Apple products

Microsoft released a number of changes to OneNote for Apple products — iPad, iPhone, and Mac — today that increase the functionality of the note-taking tool. Users of OneNote for Mac can now connect to OneDrive for Business accounts. Across ...

Stronger Internet Usage Policy, How to implement it?

Here at Computer Troubleshooters, we help our clients secure their networks.  In addition to anti-virus and anti-malware tools, we implement firewalls with content filtering and have installed tools like  ActivTrak to help monitor employee activity.  If you want to have a ...

7 iOS 7 tricks you probably need to know

I am an occasional iPad user and, at as a result, not as efficient as I would like to be.  I found some of the following tips to be helpful.  If you ...

Business Apps to transform your mobile into an on the go office.

Business Apps: Nowadays we are mainly on the go, and our mobile devices have become our best business partners. There are several business apps out there that will exponentially improve your productivity while being away from your desk. Choosing the right ...

Protect Your Mobile Devices - Including Laptops and Thumb Drives

For your Android, there is Android Device Manager. For your iPhone, iPad, and MacBook, there is Apple’s “Find my iPhone” in iCloud. But what about the data your store on USB drives and ...

Contact

Computer Troubleshooters of Pittsburgh | IT Services & IT Support Pittsburgh, PAComputer Troubleshooters of Pittsburgh | IT Services & IT Support Pittsburgh, PA Logo $$$