Sagacent's Blog

Sagacent has been serving the San Jose area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Massive Ransomware Attack is the Biggest Ever

ALERT: Massive Ransomware Attack is the Biggest Ever

Run your Windows Updates and be very skeptical about opening unsolicited emails. Failure to do so may result in a very dangerous strain of ransomware that could infect your entire network and spread to your clients, partners, and prospects.

Continue reading
0 Comments

If You’re Ever Hit With Sudden Power Loss, this Device Will Save the Day

If You’re Ever Hit With Sudden Power Loss, this Device Will Save the Day

Imagine working diligently, then being abruptly cut off due to an unpredictable power surge. It would drive anyone to anger, especially if you had just gotten a significant amount of work done. Unfortunately, power surges happen and outages are inevitable, but the least you can do is prepare for them, and minimize downtime and data loss.

Continue reading
0 Comments

Solid State Drives: Worth the Extra Expense

Solid State Drives: Worth the Extra Expense

Data storage is a major part of running a business, but when it comes to doing so, you have several options. The usual suspect, the hard drive, is what’s most commonly found in both consumer and business environments for a number of reasons. The solid state drive in particular presents unique opportunities for your business that you shouldn’t dismiss.

Continue reading
0 Comments

Careers in the Cloud Can’t Be Filled Fast Enough

Careers in the Cloud Can’t Be Filled Fast Enough

For much of the past century, if you wanted to work among the clouds, you’d join the Air Force and take it from there. Nowadays, however, working among the clouds can mean that you want to work with advanced computer systems that deliver computing, security, storage, and utilities to businesses and end-users from all around the world.

Continue reading
0 Comments

Warning: Google Docs Hit With Phishing Attack

Warning: Google Docs Hit With Phishing Attack

On Wednesday, several users found themselves the victim of a convincing phishing attack. The attack was designed to look like an invitation to view and edit a Google Doc, and is designed to steal your Google credentials and spread through your contacts.


Not only does the email look convincing, it’s also often coming from a contact you already know. Even worse, the link takes you to a Google.com URL with a legitimate-looking login screen. However, once you log in with your Google credentials, whoever is behind the attack will have full access to your account.

Once it has them, it sends the same email to your contact list in an attempt to propagate itself. This attack is well-crafted, to the point where the easiest way to catch it before getting snared is to click the small link on the page that Google hosts to check the developer’s information. Since the attack utilizes legitimate Google account functions, however, who would think to check?

Whenever you get an unsolicited email with links or attachments, it’s critical to think before you click!

Fortunately, Google was able to apparently put the kibosh on this attack within an hour of taking action, but there’s still no indication of who was responsible for this attack or if/when they will strike again. Therefore, it is important to understand how to avoid falling victim to emails like this in general.

First, if there’s ever any doubt of an email’s validity, check out some of the indicators that tend to go overlooked. This attack in particular had some oddities--for example, the email was addressed to “.” Secondly, if an email is unexpected, it never hurts to confirm its validity with the sender through an alternate method of communication.

To protect your business, you need to be sure that your staff understands that threats like this could be a major problem. In the meantime, be sure to keep your eyes out for more email-based phishing scams and other threats. If you do come across questionable messages, don’t hesitate to report it immediately, so that everyone on your team becomes cognizant of the threat.

For more information about phishing scams, social engineering tactics, and other attempts to infiltrate your network, contact the IT professionals at Sagacent at (408) 248-9800 today.

Continue reading
0 Comments

Tip of the Week: Windows 10 Makes Updating Your Hardware Drivers Easy

Tip of the Week: Windows 10 Makes Updating Your Hardware Drivers Easy

It doesn’t matter what your role is within your organization--you’ll still be using the same hardware solutions to accomplish your daily tasks. Keyboards, wireless mouses, external microphones, and just about any normal USB device, all use drivers that allow for device compatibility. Unfortunately, if these drivers aren’t installed and kept up-to-date, your technology’s performance can suffer, as well as your productivity.

Continue reading
0 Comments

A Beginner’s Guide to Running Cables in Your Office

A Beginner’s Guide to Running Cables in Your Office

Arguably one of the most important parts of running a business is the physical infrastructure of your office environment. This involves ensuring that the cabling of all network assets is properly implemented. Unfortunately, this is easier said than done, as no two businesses will utilize the same setup. We’ll walk you through some of the variables that you’ll need to consider during the cabling process, and what you can do to make it easier to handle.

Continue reading
0 Comments

3 Ways the Cloud Enhances Your Business

3 Ways the Cloud Enhances Your Business

The cloud trend has been very friendly toward businesses, allowing organizations to fulfill many of their needs and simplify processes that were challenging them only a few years ago. If you’ve never considered the cloud for your organization, it’s time to rethink your choices and ask yourself why you’re hesitant when there are so many great benefits of cloud implementation.

Continue reading
0 Comments

Tip of the Week: 4 Ways Google Maps Can Enhance Your Next Trip

Tip of the Week: 4 Ways Google Maps Can Enhance Your Next Trip

Mapping the known world has long been an endeavor sought by explorers, but thanks to a relatively recent tool called Google Maps, anyone with knowledge of a smartphone can see the world at a glance. Granted, Google Maps isn’t the easiest tool to use, but if you follow these tips, you’ll feel like you have the whole world in the palm of your hand… literally.

Continue reading
0 Comments

Domino’s Invests in a Global Fleet of Pizza Delivery Robots

Domino’s Invests in a Global Fleet of Pizza Delivery Robots

On March 29th, Starship Technologies, a self-driving robotics company, announced a partnership with Domino’s Pizza Enterprises, a franchisor for the Domino’s Pizza brand in Australia, New Zealand, France, Belgium, The Netherlands, Japan, and Germany (totaling over 2,000 stores). This new affiliation allows Starship Technologies to build a fleet of autonomous delivery robots, helping Domino’s with its eventual delivery person shortage, based on the company’s growth estimates for the next 5-to-10 years.

Continue reading
0 Comments

Scareware Isn’t Scary if You Know What to Look For

Scareware Isn’t Scary if You Know What to Look For

The popularity of security software has required malware distributors to be clever with their delivery methods. This is why rogue security software exists, and why you need to be absolutely certain that your network doesn’t have these fraudulent programs installed.

Continue reading
0 Comments

Tip of the Week: Get the Most From Your Company’s Email With These 3 Tools

Tip of the Week: Get the Most From Your Company’s Email With These 3 Tools

As a small business grows and takes on more employees and adds more departments, one aspect that becomes increasingly difficult to manage is email. Essentially, you go from using a handful of email addresses to managing dozens of accounts. If it feels like you’re losing control of your company’s email situation, then you’ll want to implement the following email solutions.

Continue reading
0 Comments

It’s Now Legal for ISPs to Sell Your Online Browsing History

It’s Now Legal for ISPs to Sell Your Online Browsing History

Due to recent legislative activity, the rules and regulations that the Federal Communications Commission put in place to protect the personal data of Internet users have been struck down. This change now allows ISPs, or Internet Service Providers, to sell the browsing information of their customers to advertisers without consent--a move many consider to be a threat to net neutrality. This is what you need to know.

Continue reading
0 Comments

IBM Drops Bomb on the Industry By Storing Data on an Atom

IBM Drops Bomb on the Industry By Storing Data on an Atom

Data storage has long been a major pain point for technology development, but a rather large (or small) breakthrough has resulted in data being stored on a single atom. The development comes from researchers at IBM, and it could have a potentially nuclear impact on the way that data storage functions.

Continue reading
0 Comments

Tip of the Week: 4 Fundamentals of Good Customer Service

Tip of the Week: 4 Fundamentals of Good Customer Service

Customer service can be tricky to gauge sometimes, as you don’t often hear about a consumer’s experience unless you provide exceptional service, or if you’re not providing good enough service. The problem here is that, unless you do something to improve the customer service you provide, you could very well lose them to your competition. What are some steps that your business can take to improve customer service?

Continue reading
0 Comments

$100 Million Hacking Incident Shows that No Company is Immune

$100 Million Hacking Incident Shows that No Company is Immune

It’s a tough lesson to learn, but almost any company is susceptible to cyber-attacks that take advantage of any security setup’s weakest link: the people involved. This lesson was most recently learned the hard way by two unnamed tech companies that fell victim to a phishing campaign that was allegedly run by Evaldas Rimasauskas, a Lithuanian man accused of stealing $100 million from them.

Continue reading
0 Comments

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

Continue reading
0 Comments

Tip of the Week: 3 Best Practices to Organize Your Files and Devices

Tip of the Week: 3 Best Practices to Organize Your Files and Devices

It can be hard to accomplish work in a timely manner when your technology is a haphazard mess. To help with this, we’re devoting this week’s tip to three ways you can improve workflow by organizing your technology.


Make Sure Your Files Are Where They Need To Be
How do you organize your files? Is your desktop filled to the brim with icons, making it nearly impossible to find what it is you are looking for? This isn’t an unusual problem, but it is one that needs to be fixed in order to simplify your workflow, especially if you utilize an on premise shared network drive. In order to avoid misplaced files, wasted time, and general confusion, it’s best to educate every user on proper protocol for storing and sharing files before they access the shared drive.

For help with establishing an organized approach to file sharing that fits your company’s workflow, give Sagacent a call at (408) 248-9800. Our trained IT technicians understand the ins and outs of computer networking, and can set up a system that maximizes efficiency, productivity, and communication. This includes backing up your files in order to safeguard your company from data loss.

Delete Unnecessary Programs and Applications
It’s the nature of doing business for computers to accumulate programs over time, and for some of these programs to fall out of use as they’re replaced by better software. In order to keep your system clear of clutter, it’s in your company’s best interest to remove unused and unnecessary programs from your network.

Also, following through with such a move helps improve your company’s security, seeing as you won’t have outdated apps on your network that don’t get updated (a major security risk). In order to safeguard your network from such a risk, we recommend performing regular network audits. Sagacent can assist you with this too.

Keep Track and Get Rid of Unused Devices
Like software, mobile devices tend to be replaced by new and improved versions every so often. When you get a new device, what do you do with the old one? While you’ve got several options of what you can do with it (like repurposing it for a different need or keeping it on hand as a backup device), there are two fates that you don’t want for your old friend; losing track of it and disposing of it improperly. Devices that were once used for company purposes may have sensitive data still stored on them, or, just as bad, company-used apps that can access sensitive accounts without need of a password. You also don’t want to just chuck an old mobile device in the trash, seeing as computing technologies are made up of materials that are bad for the environment. Plus, if there is still a shred of company data on a trashed device, then you’ll have no idea of its fate once the trash man carries it away.

For help retiring an old device by wiping it clean of all company data, as well as recycling a device the right way so the environment isn’t harmed, Sagacent is standing by to assist you.

Now that your devices and files are in order, you will experience the benefits of a workflow that’s more organized and more productive. Call us today at (408) 248-9800 for assistance with all of your company’s technology needs.

Continue reading
0 Comments

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Two of the primary developers of tablets--Apple and Samsung--have created two of the most popular devices out there: the iPad Pro and the Galaxy Tab S3. If you’re in need of a tablet, we can help you go over your options so that you choose the one that best suits your needs.

Continue reading
0 Comments

Getting Back to the Basics for World Backup Day!

  Authentication required.

This is a password protected blog, please kindly enter the password into the password field below to view the blog.

Mobile? Grab this Article!

Qr Code

Upcoming Events

No events