fbpx
253.777.0763    Get SUPPORT

Graemouse Technologies Blog

Graemouse Technologies has been serving the Lakewood & Tacoma area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How to Use YouTube’s Full Capabilities for Your Business

How to Use YouTube’s Full Capabilities for Your Business

We all know how to use YouTube… find video, click video, watch video. Simple, right?

0 Comments
Continue reading

Know Your Tech: Social Media

Know Your Tech: Social Media

You see the term “social media” thrown around all the time, but what does it mean for both individual users and whole businesses? Organizations that understand the importance of social media have a unique advantage over other businesses in the same industry, be it a way to attract more consumers or a way to protect against common security threats that find their home on these websites.

0 Comments
Continue reading

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

Tip of the Week: Make Facebook More Private By Enabling the Follow Feature

While it’s a security best practice to keep strangers off of your Facebook account, you might feel that it’s understandable to accept an unknown request for the sake of networking or otherwise. This isn’t the ideal way to approach Facebook, but you do have a unique opportunity to allow users to view your profile and follow your public posts, without the need to accept a friend request.

0 Comments
Continue reading

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Study Finds Social Media Phishing Scams to Be the Most Dangerous

Ordinary fishing, where you hope for a simple-minded fish to latch onto your hook, relies on using a proper lure. The same can be said for the virtual method of phishing, where a hacker will use a similar type of “lure” to convince the target to bite. These phishing scams are especially useful for hackers who want to take advantage of social media to find new targets. A recent study has shown that this is a surprisingly effective method of phishing.

0 Comments
Continue reading

Tip of the Week: How to Avoid Oversharing on Social Media

Tip of the Week: How to Avoid Oversharing on Social Media

Social media, as wonderful a tool for connecting and communicating as it is, does have its dangers. Fortunately, these risks may be mitigated through careful deliberation and pragmatic posting habits, but only if you know what they are. What follows are some easy habits to encourage a heightened state of security both digitally and in the physical world.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Education Virtual Reality Health Apps Fraud Social Media Avoiding Downtime Google Wire Server Data Storage Access Control Work/Life Balance Innovation Servers Software as a Service Paperless Office Automation Smartphone VPN Workforce Managed IT Cybersecurity Mobile Computing Best Practices Windows 10 Millennials Telephony Cryptocurrency Saving Money Augmented Reality Botnet Mouse Network Congestion Backup Business Computing How To Telephone Systems Law Enforcement Windows 10 Privacy Employer-Employee Relationship Virtual Assistant Security Business Continuity Ransomware Two-factor Authentication Telecommuting Keyboard Artificial Intelligence Windows 7 Twitter Phishing Biometric Security Computer Care Productivity Workplace Tips Computers Data Backup Blockchain Enterprise Content Management IT Support Hardware Users Gadgets Recovery Collaboration Public Cloud Quick Tips Computer Smartphones Applications Mobile Device Cloud User Error Connectivity Bandwidth Data Security Tip of the week Administrator Mobile Device Management Malware Managed IT Services Windows Remote Monitoring Authentication Internet Chrome Advertising Private Cloud VoIP Machine Learning Office 365 Wireless Charging Emails Google Apps YouTube Accountants IT Consultant Disaster Recovery Telephone System Meetings BDR Security Cameras Managed IT Services Amazon Web Services Email IT Services Communication BYOD Wi-Fi Data Business Proactive IT Update Microsoft Word Managed Service IT Plan User Tips Data Breach Alert Sync Operating System Unsupported Software Business Intelligence Gmail Data Recovery Google Docs Content Management Virtualization Miscellaneous Scam Flexibility Software Sports Network Amazon Government Money Router CES OLED Thought Leadership Patch Management Identity Theft IT Infrastructure Infrastructure Outsourced IT Browser Net Neutrality Bring Your Own Device Social Engineering MSP Communications Small Business Upgrade Password Network Security Display Microsoft Office Efficiency Multi-Factor Security Cleaning Data Protection Android Cybercrime Networking Holiday Passwords Google Drive Spam Blocking Cloud Computing Staff Business Management Save Money Tech Term Redundancy App Vulnerability Hackers Technology Wireless Solid State Drive Hosted Solutions Voice over Internet Protocol Tip of the Week Human Resources OneNote Encryption Internet of Things Website Mobile Devices Information Comparison Spam Training Facebook Settings IT Management

Newsletter Sign Up