fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Know Your Tech: Social Media

Know Your Tech: Social Media

You see the term “social media” thrown around all the time, but what does it mean for both individual users and whole businesses? Organizations that understand the importance of social media have a unique advantage over other businesses in the same industry, be it a way to attract more consumers or a way to protect against common security threats that find their home on these websites.

0 Comments
Continue reading

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

Tip of the Week: How to Avoid Oversharing on Social Media

Social media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Bandwidth Data Recovery Disaster Recovery Comparison Charger IT Management Skype Workers FENG Network Addiction Hosted Computing How To Training Internet of Things Cybersecurity Business Management Business Continuity Human Resources Software as a Service Cortana Mobile Devices Windows 10s Money Workplace Tips Mobile Device Router Software VPN Small Business Data Storage Phishing Tech Term Collaboration Current Events Net Neutrality Shortcuts App Efficiency Technology Managing Stress Ransomware Smartphones Practices Website webinar Alert Cast Digital Signature CES Remote Monitoring Employer-Employee Relationship Google Data Backup Avoiding Downtime Computer Fan Wi-Fi Productivity Fraud Spam Blocking Remote Worker Computer VoIP Windows 10 Information Communications Data Spam Unsupported Software Search Engine Word Network Security Microchip Internet IT Plan Saving Money Automation Mobile Device Management Apps Security Update Social Content Management Entertainment Smartphone Smartwatch Emergency Save Money Virtualization Holiday Business Privacy Hackers Operating System WiFi Gadgets Applications Chrome Data Breach Government Miscellaneous Two-factor Authentication Data Protection Telephony Windows 10 eWaste Travel Telephone System Software Tips Google Docs Knowledge Nanotechnology Password User Error Windows Cybercrime Machine Learning BYOD Public Cloud User Tips Computers Encryption IT Services Upgrade IT Support Advertising Redundancy Social Engineering Virtual Assistant Private Cloud Hosted Solutions Managed IT Networking Innovation Smart Office Malware Sports Data Security Browser Identity Theft Cloud Passwords Netflix Microsoft Office Outsourced IT Company Culture File Sharing Evernote Managed IT Services Email Server Managed IT Services Telephone Systems Windows Server 2008 Smart Tech Cloud Computing Access Control Scam Connectivity Social Media Electronic Medical Records BDR Communication Infrastructure OneNote FCC Blockchain Hardware Backup Vulnerability Facebook Artificial Intelligence Office 365 Best Practices Business Computing Managed Service Online Shopping Document Management Business Intelligence Start Menu Voice over Internet Protocol Law Enforcement Tip of the Week Keyboard Value Recycling Windows 7 Excel Servers Remote Work Google Drive Paperless Office Root Cause Analysis Android NIST Microsoft Bring Your Own Device Botnet Frequently Asked Questions Settings

Newsletter Sign Up