fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Use YouTube’s Full Capabilities for Your Business

How to Use YouTube’s Full Capabilities for Your Business

We all know how to use YouTube… find video, click video, watch video. Simple, right?

0 Comments
Continue reading

Know Your Tech: Social Media

Know Your Tech: Social Media

You see the term “social media” thrown around all the time, but what does it mean for both individual users and whole businesses? Organizations that understand the importance of social media have a unique advantage over other businesses in the same industry, be it a way to attract more consumers or a way to protect against common security threats that find their home on these websites.

0 Comments
Continue reading

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

Tip of the Week: How to Avoid Oversharing on Social Media

Social media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Password Management History Password Remote Work Router Operating System Internet Wi-Fi Upgrade Help Desk Telephony Workplace Tips Digital Signature Passwords How To Mobile Device Management IT Support Miscellaneous Cryptomining Windows 10 ISP Outsourced IT NIST Workers Cloud Virtual Assistant Security Ransomware Software as a Service Automation Software Collaboration Access Control Augmented Reality Trending Phishing Efficiency Cloud Computing Managed IT Cortana Google Docs Samsung Investment Windows 7 Saving Money Bandwidth Data Security Audit Addiction CES Digital Signage Amazon Web Services Managed Service Social Media Recycling Privacy Spam Blocking Data IT Services Vulnerability Windows Server 2008 Network Security Government Display Sports Procurement Server Data Storage Online Shopping Twitter Google Training Bring Your Own Device Facebook Word BDR Chrome Encryption Unsupported Software Nanotechnology Network Voice over Internet Protocol Servers HBO Human Resources Redundancy Camera Leadership Scam Remote Monitoring Microsoft App Net Neutrality Windows 10 Disaster Recovery Processor Mobility VoIP Managed IT Services Computers Apps Office 365 Artificial Intelligence Settings Managed IT Services Update Internet of Things Avoiding Downtime Computer Tip of the Week Botnet Machine Learning Smartphones Business Holiday Communications Smartwatch Browser Microsoft Office Two-factor Authentication Quick Tips Data Breach Microchip Website Data loss Users Health Business Computing Cryptocurrency Backup Manufacturing OneNote Hosted Solutions Comparison Smartphone Identity Theft Virtualization Networking Productivity Paperless Office Data Protection VPN Content Management Cybersecurity Hardware Skype User Tips File Sharing Managed Service Provider Data Backup Blockchain Hackers Best Practices Cybercrime Hard Drive Telephone Systems Supercomputer Social Engineering Fraud Save Money Telephone System Employer-Employee Relationship Google Drive Shortcuts Spam IT Management Mobile Devices Android Staff Business Continuity Technology Tech Term Company Culture Connectivity Business Intelligence Infrastructure Information Business Management Email Data Recovery Private Cloud Communication Malware IT Plan Innovation Gadgets Applications Small Business Keyboard Practices Law Enforcement Education Smart Office Alert Mobile Device Public Cloud BYOD Money Meetings Windows

Newsletter Sign Up