
WHAT IN THE WORLD IS A QR CODE?
QR Codes are 2-dimensional bar codes in a square format that can be scanned and read by most smart phones. When they are scanned, they
QR Codes are 2-dimensional bar codes in a square format that can be scanned and read by most smart phones. When they are scanned, they
As cyber attacks continue to rise, businesses large and small need to stay one step ahead with IT services that keep them protected no matter
Have you ever felt the sheer panic of misplacing your cell phone? Your eyes open wide as you begin a frantic search, only to find
Tech support scams are unfortunately becoming all too common. Because of this, it is becoming increasingly more important to be able to recognize a fake
Cyberhackers are constantly strengthening their tactics to trick you into giving them your confidential information, especially during the holidays. Here are some of the most
Credentials Prompt Keeps Appearing in Outlook Microsoft Outlook is great when it works, but can be frustrating when it doesn’t. One issue that is encountered
As taking a step further in extending layers of security for all clients, Center for Computer Resources, CCR, will be implementing Two Factor Authentication (2FA)
Find, Copy & Paste the E-mail Message Header When reporting a suspicious e-mail or a potential phishing attempt to ITS, please include the Message Header.
What is Phishing? The word “Phishing” is a variant of the word “fishing.” It generally comes from an analogy of spammers sending many emails (casting
"*" indicates required fields