Login 

Sagacent Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Categories
    Categories Displays a list of categories from this blog.
  • Tags
    Tags Displays a list of tags that have been used in the blog.
  • Bloggers
    Bloggers Search for your favorite blogger from this site.
  • Team Blogs
    Team Blogs Find your favorite team blogs here.
  • Login
    Login Login form
Recent blog posts

3 Ways to Prioritize Fighting Botnets

Posted by on in Security

b2ap3_thumbnail_fight_off_a_botnet_400.jpgThe Internet is infested with threats of all kinds, some of the most annoying are bots. These consist of systems which potentially gather information from a variety of sources. While primarily used by search engines to gather data from websites (these are the good kinds), there are others who may have fallen into the hands of hackers which steal information or send spam.

0
Continue reading 0 Comments

Alert: Critical Microsoft Office Flaw Patched

Posted by on in Security

b2ap3_thumbnail_Microsoft-Office-icon_400.jpg‘Tis the season for technology vulnerabilities and exploits. In addition to Sandworm and Cryptowall 2.0, another flaw has been found in Microsoft Office. This particular threat allows a hacker to gain control of a computer system, making it a dangerous and potentially threatening gamble for your business to ignore it. Thankfully, the issue has been patched, and the fix is now available to the public.

0
Continue reading 0 Comments

b2ap3_thumbnail_dumpster_app_400.jpgAndroid smartphones are at the top of the mobile market, but they have a flaw which some people don’t even realize is there - the lack of a recycle bin. Anything deleted is unlikely to be recovered, which can be seriously inconvenient for many people. What if you accidentally delete something important? Thankfully, there is a fix to this problem in the form of an app called Dumpster.

0
Continue reading 0 Comments

Tired of Email? Here are Some Alternatives

Posted by on in Technology

b2ap3_thumbnail_email_alternatives_400.jpgEver since the world adopted the Internet, email has been a part of the picture. Initially, email seemed like a dynamic tool compared to faxes and metered mail, but now, the average worker despises their email inbox for its unreasonable demands on their time and its hindrance to productivity. Are there any options that can replace email in the workplace?

0
Continue reading 0 Comments

b2ap3_thumbnail_Fotolia_56321886_XS.jpgSan Francisco is in the running to host the 2024 Olympic and Paralympic Games. The U.S. Olympic Committee meets in December to decide which city to submit to the International Olympic Committee. In competition with San Fran are Los Angeles, Washington, D.C., and Boston. How cool would it be if we got to host the Olympics?!

...
0
Continue reading 0 Comments

b2ap3_thumbnail_Fotolia_67884335_XS.jpgWhen you visit your neighborhood hardware store, you halfway expect to be greeted by a knowledgeable and friendly worker with years of construction experience under their belt. But this is Silicon Valley, and at Orchard Supply Hardware in downtown San Jose, customers are now greeted by 5-foot tall, plastic-shelled robots.

...
0
Continue reading 0 Comments

b2ap3_thumbnail_laptop_batty_boost_400.jpgWe all know the pains of having a laptop with low battery power, but sometimes it feels like you're perpetually plugging in your computer; even when it seems like the battery should last longer. These battery problems are common, but they aren’t an endgame for your laptop. There are several ways you can jumpstart your laptop’s battery.

0
Continue reading 0 Comments

Cloud Computing Value is Driving Business

Posted by on in Cloud

b2ap3_thumbnail_cloud_value_400.jpgProfitability is the measure of success in business, and behind it is some desperation. Business owners of all types are looking to technological innovations to give their business a chance for growth. Obviously everything someone tries to sell you won’t benefit your endeavor, but one aspect that has been gaining attention from business owners is the use of cloud computing to increase company profitability. It accomplishes this by using value.

Tagged in: Business cloud Value
0
Continue reading 0 Comments

b2ap3_thumbnail_friendly_competition_400.jpgFor American retailers, Black Friday is the biggest and most competitive day on the shopping calendar. Consumers reap the rewards of all of this competition by taking advantage of deep discounts on their favorite items. Competition like this is a win-win for both parties! Can your business benefit like this from an infusion of friendly competition?

0
Continue reading 0 Comments

b2ap3_thumbnail_protect_your_business_400.jpgIt doesn’t take much to disrupt your company’s network and cause downtime. Whether it’s from something major like a natural disaster, or something minor like forgetting your network login credentials, you need to have a plan in place that gets your network up and running as soon as possible. Here are three common scenarios that you need to plan for.

0
Continue reading 0 Comments

b2ap3_thumbnail_strange_chargers_for_mobile_400.jpgEvery mobile device owner has some kind of charging cord they keep nearby. Most of us don’t think twice about our charging cord and we just use what came with the device. However, when it comes to charging our phones, we’ve got several options available that make the standard charger seem rather boring. Here are five of our favorite chargers.

0
Continue reading 0 Comments

b2ap3_thumbnail_employees_concerned_about_byod_400.jpgSome businesses embrace Bring Your Own Device (BYOD) policies in the workplace, while others aren’t so sure. If you think that employers are the only ones worried about BYOD policies, you might be surprised to learn that employees are just as concerned about it as their employers. Of course, their reasons are entirely different, but are still valid reasons to be on edge.

0
Continue reading 0 Comments

Tip of the Week: How to Locate a Lost File

Posted by on in How To

b2ap3_thumbnail_find_a_file_400.jpgIt’s easy to get scatterbrained when things get busy. When this happens, you can forget important things like where you placed your keys, and where you saved your computer file. To help you out, here are some tips on how to locate a missing file. As far as your missing keys go, did you check underneath the couch?

0
Continue reading 0 Comments

What Flu Season Can Teach Us about Cyberdefense

Posted by on in Security

b2ap3_thumbnail_protect_yourself_against_viruses_400.jpgIt’s flu season, and just like office workers around the country are taking preventive health measures like stocking up on tissues and vitamin C, so too are IT technicians doing everything they can to stop the spread of computer viruses on their company’s network. Although, unlike the flu, computer viruses are more than a seasonal threat.

Tagged in: Hackers Privacy Security
0
Continue reading 0 Comments

b2ap3_thumbnail_windows_10_cios_400.jpgBefore Microsoft officially releases Windows 10, beta versions are first given to select business leaders like CIOs. This is a standard practice for software manufacturers because it helps them to work out real-world bugs before publicly releasing their product. What do CIOs think of the Windows 10 technical preview? Inquiring business minds want to know.

0
Continue reading 0 Comments

b2ap3_thumbnail_stop_wasting_time_400.jpgYears and years of doing business means years and years of applications and software getting installed on your computer. Before you know it, you don't use any of them anymore, or they are outclassed by other, more useful programs. Going through each of your systems individually is time-consuming and monotonous. So, what can you do about this?

0
Continue reading 0 Comments

b2ap3_thumbnail_smartphone_productivity_400.jpgIt seems as if you can't go anywhere on the Internet without encountering some security violation, and there's a lot of discussion concerning how to keep your data safe. Undoubtedly, mobile devices will surely arise in the debate. Without a doubt, mobile devices are capable of vastly improving productivity while out of the office, but is this enough to offset the incredible amount of risk which comes with hopping from network to network?

0
Continue reading 0 Comments

b2ap3_thumbnail_it_is_not_sorcery_400.jpgDoing business today is much different than it was in medieval times. Thanks to the Renaissance, modern businesses now have a technology-based economy, instead of one that's magic-based--this has been an especially difficult transition for wizards. Although, one medieval business practice that's still going strong is the idea behind guilds.

0
Continue reading 0 Comments

b2ap3_thumbnail_automatically_reboot_400.jpgWhen’s the last time you rebooted your PC or mobile device? If you’re drawing a blank to this question, then you should take the minute or two it takes to reboot as soon as possible (or 15 minutes if you’re still using Windows XP). To a computer, rebooting can be likened to getting a full night’s sleep; without it, performance will suffer.

0
Continue reading 0 Comments

b2ap3_thumbnail_Poodles_400.jpgA while back we discussed the POODLE vulnerability found in SSL 3.0 SSL encryption technology. This vulnerability is found in all operating systems, as it is found within the web browser’s abilities to process SSL encryption. Thankfully, major companies are stepping up to tackle the issue, and Microsoft has released a basic solution to fix the vulnerability in Internet Explorer.

...
0
Continue reading 0 Comments




LiveZilla Live Help

I would like a 30 minute business discussion with Sagacent

Fill in your information below and we will be in contact with you shortly.

Occasionally, Sagacent will share relevant IT information with you via email.