fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Social Media

Know Your Tech: Social Media

You see the term “social media” thrown around all the time, but what does it mean for both individual users and whole businesses? Organizations that understand the importance of social media have a unique advantage over other businesses in the same industry, be it a way to attract more consumers or a way to protect against common security threats that find their home on these websites.

0 Comments
Continue reading

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

Tip of the Week: How to Avoid Oversharing on Social Media

Social media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Collaboration Public Cloud Telephone System Cloud Computing Identity Theft Workplace Tips Router Bring Your Own Device Email Human Resources Travel IT Support Cloud Emergency Automation Business Continuity Administrator Entertainment Botnet CES Fraud Data Protection MSP Server Windows 7 Internet of Things Malware Communications Accountants Ransomware Supercomputer Health Alert Quick Tips Internet Data eWaste IT Plan Workers Spam Blocking Redundancy Business Efficiency Privacy Electronic Medical Records Sports App Hardware Amazon Web Services Network IT Consultant Managed IT IT Management Password Infrastructure Virtual Assistant Chrome VoIP BDR Windows Server 2008 Applications Cortana Enterprise Content Management Business Intelligence Business Management Windows Data Security Vulnerability Social Media Google Law Enforcement Network Security YouTube Data Breach Scam Mobile Devices Social Engineering Cybercrime Hosted Solutions Tip of the Week IT Services Proactive IT Mouse Machine Learning Computer Care Computer Computers Data Recovery Managed IT Services Innovation Smartphone Managed Service Provider Emails Google Drive Recycling Save Money Tech Term Firewall Upgrade Website Browser User Error Settings Cryptocurrency Backup Meetings Business Computing Update Google Docs Data Backup Software as a Service Small Business Money Office Budget Mobile Computing OneNote Augmented Reality Artificial Intelligence Facebook Online Shopping Big Data Productivity Wi-Fi Digital Signature Microsoft Data loss Trending Employer-Employee Relationship Telephone Systems Mobile Device Management Android Bandwidth Saving Money Managed Service Encryption Apps Skype How To Smartphones ISP Government Unsupported Software Voice over Internet Protocol WiFi Software Technology Private Cloud Access Control Operating System Content Management Paperless Office Connectivity Security Managed IT Services Spam Windows 10 Miscellaneous Remote Monitoring Telephony Password Management Solid State Drive Office 365 Gadgets Networking BYOD Help Desk Two-factor Authentication Word Virtualization Security Cameras User Tips Phishing Data Storage Avoiding Downtime Wire Windows 10 Holiday Keyboard Remote Work Communication Cleaning Comparison Net Neutrality Mobile Device Blockchain Servers Network Congestion Hackers Outsourced IT Thought Leadership Information Best Practices Cybersecurity Authentication VPN Microsoft Office Passwords Twitter Disaster Recovery

Newsletter Sign Up