Logo 2 opaque
  • Home
  • Service
  • News
  • About us
  • SOS!
  • Customer Portal
    • Portal
    • Remote Access
  • (570) 779-4018
  • Home
  • Service
  • News
  • About us
  • SOS!
  • Customer Portal
    • Portal
    • Remote Access
  • (570) 779-4018
Contact us
About Amanda Herstek
IT Cybersecurity Notifications Explained

IT Cybersecurity Notifications Explained

Posted by By Amanda Herstek August 7, 2023Posted inArticles, Cybersecurity
Cybersecurity notifications inform businesses about potential risks and empower them to take action. Yet the various types of alerts mean different things. It can be challenging to know what action…
Read More
What Happens When You Delete a File?

What Happens When You Delete a File?

Posted by By Amanda Herstek August 3, 2023Posted inArticles, Guides
When you delete a file, it disappears from your desktop. That can be helpful to clear up clutter and give you a sense of accomplishment, or it can cause a…
Read More
What Is SharePoint, and Why Use it?

What Is SharePoint, and Why Use it?

Posted by By Amanda Herstek July 27, 2023Posted inArticles, Guides, Microsoft365
Mobile, remote workforces still need tools to share and collaborate with one another. Business teams want to work together and get the job done efficiently. Microsoft SharePoint helps make that…
Read More
Are Digital Wallets Safe to Use?

Are Digital Wallets Safe to Use?

Posted by By Amanda Herstek July 26, 2023Posted inArticles, Guides
With the embrace of smart mobile devices, digital wallets have grown popular. Also known as e-wallets or mobile wallets, these apps store payment information virtually. The convenience is undeniable; the…
Read More
Using Tech to Tailor Your Work Day

Using Tech to Tailor Your Work Day

Posted by By Amanda Herstek July 24, 2023Posted inArticles, Guides, Microsoft365
Using Tech to Tailor Your Work Day Most of us can admit that we have lost track of time during the workday on occasion.  Sometimes time can get away from…
Read More
Protect Your Business with Passwordless Authentication

Protect Your Business with Passwordless Authentication

Posted by By Amanda Herstek July 16, 2023Posted inArticles, Cybersecurity
"123456," "letmein," and "password" remain all too common passwords. It’s difficult to believe, but people still use simple, obvious passwords. They even repeat them across sites to avoid having to…
Read More
5 Best Practices for Buying Technology for Employees

5 Best Practices for Buying Technology for Employees

Posted by By Amanda Herstek July 11, 2023Posted inArticles, Guides
5 Best Practices for Buying Technology for Employees Buying technology for personal use can be exciting once you get past the price tag. Yet there are many factors to consider…
Read More
8 Steps to Protect Your Company Data When People Leave 

8 Steps to Protect Your Company Data When People Leave 

Posted by By Amanda Herstek July 11, 2023Posted inArticles, Guides
Businesses want everyone to be a big happy family with no turnover, but that’s not always possible. When employees leave, you may be opening the door to a data leak…
Read More
How Your Business Could Benefit from a vCIO

How Your Business Could Benefit from a vCIO

Posted by By Amanda Herstek July 5, 2023Posted inArticles, Cybersecurity, Guides
Businesses often hire a managed service provider (MSP) for tech support. But if that’s all you’re getting from your MSP, you could be missing out. You might gain by adding…
Read More
What VPNs Can and Can’t Do

What VPNs Can and Can’t Do

Posted by By Amanda Herstek June 27, 2023Posted inArticles, Cybersecurity
Virtual private networks (VPNs) are becoming more common. Many people use VPNs to establish an encrypted connection over a public network or to add privacy and security. Think of a…
Read More

Posts pagination

Previous page 1 … 4 5 6 7 8 Next page

Recent Posts

  • Cybercriminals Are Now Targeting Business Collaboration Tools
  • 7 Bonuses For Small Business In Microsoft 365
  • Microsoft Teams Premium: Is It Worth It for Your Business?
  • Why You Shouldn’t Ignore Old Email Accounts
  • 6 Quick Tips for Staying Secure in the Age of AI

Recent Comments

No comments to show.

Archives

  • May 2025
  • April 2025
  • March 2025
  • January 2025
  • December 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023

Categories

  • Articles
  • Backup
  • Cybersecurity
  • Guides
  • Microsoft365
  • Top Picks
Copyright 2025 — Herstek & Associates, LLC. All rights reserved. Sinatra WordPress Theme
Scroll to Top