1. Usernames and Passwords. Yes I said it. Every I.T. person has told you not to write down your passwords. There are many desks that I have come across where the password is a post-it note on the monitor, hidden under a keyboard or mouse pad, or in a desk drawer. This is not where Read More >
About: Joe
Joe began working in IT at the age of 16, and began working as a web developer at 17, working summers for several years, developing an expertise in PHP and JavaScript programming. Joe then joined the GGNet team, taking leadership of the Fremo™ project and focusing his programming and crisis intervention expertise in network and Internet security solutions.
Posts:
The 3 Keys to Making Mobile Emails More Professional
September 14, 2016 by Joe D. GrossbauerA 2016 study by Fluent found 82% of people use their smartphones for email, making it the single most popular activity on a smartphone. And with more and more business emails being sent from phones, people wonder how to keep email professional while keeping with the simple convenience of cell phones. Email Signature All smartphones come Read More >
How Secure is the Cloud?
June 21, 2016 by Joe D. GrossbauerI get asked this question so often, I finally decided to write out a full answer. So is the cloud secure? Are you ready? Here comes the big answer… Yes! And no. And also maybe so. Frankly, this is a difficult question to answer, simply because the answer is so variable. But I’ll do my Read More >
The Making of a Backup Package
June 16, 2016 by Joe D. GrossbauerOur team recently had some, well, intense discussions on what types of backups are best for our clients, and I think some of these ideas are worth sharing. There are a couple different types of backups, and I think it’s important for people to understand what is best for them. Backups can be on-site, off-site, Read More >
Help, I’ve been hacked! Now what?
October 6, 2015 by Joe D. GrossbauerHow do I know when I’ve been hacked? First, let’s define “being hacked”. A hack is when someone unauthorized gains access to your system. The malicious intent of this someone can vary from a student pulling a prank to hacker trying to find and steal your most valuable data. The most common hack is somewhere Read More >