Blog
Say Hello to the new Microsoft Office Icons, whether you like them or not …
Microsoft has revealed all-new Office 365 app icons with bolder, lighter hues, combined with simplistic visuals and supposedly more recognizable symbols.New Office 365 Icons.
These New Icons are supposedly easier to recognize, although they may be a little ‘different’ to those of use who have used the old icons since they were introduced in 2013.
Good News! Fighting Malware in 2019 Will Be Much Easier (Just Kidding … It Gets Way Harder)
Through 2018 the malware forecast looked good – Artificial Intelligence (AI) was being deployed against malicious threats and the outlook was becoming rosy…
Unfortunately, 2019 isn’t shaping up so well. State actors are intent on leveraging a much more affordable weapon against their foes – and that weapon is Cybercrime.
Have you ever needed to Translate a PowerPoint Presentation? Do it for free with this official microsoft addon
Have you ever needed to Translate a PowerPoint Presentation? Do it for free with this Microsoft add-on. It’s also real-time & did we say – FREE!
It can be somewhat embarrassing to realize that all the time and effort you put into your presentation might be lost in translation, when someone in the audience struggles with the language you built it in.
Microsoft Brings Microsoft Defender to Macintosh
Microsoft Defender can keep your Mac safe too - or can it?Microsoft antivirus software is coming to Apple, but is only available to business customers for now.Microsoft brought their virus protection software to Mac a week or so ago, giving it a more...
Computer Security Solutions on the Radio – Street Smart Biz & Retirement
This last Saturday, the 23rd of February - Computer Security Solutions Founders, Greg Hewitt-Long and Dianne Stayton, were on the Radio. Interviewed by Ron & Julie Richards for their Street Smart Biz & Retirement show, Greg & Dianne give some background...
Security Doesn’t Happen by Accident – an introduction to Computer Security Solutions
When you realize that you just don't have a good handle on the security risks that your business faces on a day-to-day-basic - CALL US!
Gain More Flexibility with a Focus on Security Intent
Strategies for dealing with cyber criminals continue to evolve. There is a trend toward looking beyond centralized firewalls, for example, and establishing smaller firewall boundaries so there can be a tighter focus on zero-trust strategies. Security intent is fast...
Finding the Right Enterprise Security Solutions for Your Organization
If your organization is like most, you’ve got sensitive information populating many areas of your system. You’ve probably got firewalls providing some safety from intruders, but have you developed an enterprise security strategy? Because of the gaps present in many...
Believing Common Cyber Security Myths Can Put Your Organization at Risk
Myths can be a fun pastime to explore, but if you’re following cyber security myths, you could be putting your system and your data at risk. Cyber security myths lend to an already challenging obstacle that many organizations, including small- to medium-size...
How to safely clean your Computer Monitor or TV Screen
When was the last time you cleaned your computer monitor or flat screen TV (or even a curved TV screen)? You’ll be amazed at how much dirt accumulates!
A dirty monitor or TV screen can result in eye-strain and cause head-ache – clean that screen to reduce stress and give your eyes a rest!
Determine Your Digital Resiliency and Strengthen Your Cyber Security Strategy
An area of increasing importance for a more robust cyber security strategy for any organization is in determining your level of digital resilience. This is often carried out via an internal audit that takes into account every aspect of how your organization processes...
How to Break Out of a Browser Window that’s been Taken Over by a Hijacker
There exist many criminal gangs who attempt to extract money from you, or any unwary internet users. The ways and means which they attempt to do this, are many and varied. The methods these criminals use varies from ransomware to hijacked websites, and everything...
Threat Detection: Utilizing Tools Based on Time
Threat detection is a critical part of any security strategy and business continuity plan, but it requires an awareness of how selected security solutions operate in relation to time. Time is a critical factor, because time to resolution can make the difference...
Finding the Right Cyber Security Solution to Protect Your Organization
Organizations are faced with constant cyber threats, regardless of industry. To better understand how to be proactive in addressing security risks, companies need to understand their data, environment and business needs. Cyber security isn’t a one-size-fits-all...
Improve Cloud Security and Reduce Risk
Cloud computing is being used by organizations across industries, and the advantages are clear. One of the barriers to utilizing cloud-based solutions originally for many organizations was cloud security. Cloud vendors knew that if clients’ data was compromised,...
Follow These Tips to Strengthen Your Cyber Security
Today’s workforce doesn’t only work from the office. Most employees are also working from remote computers, phones and tablets. We’re connected everywhere we go, which means even when we’re “off the clock,” we’re still working. There are obvious productivity...
Computer Security Solutions and Northern Colorado Veteran Resource Center Are Partnering Up
You might think that the New Northern Colorado Veteran Resource Center and a local IT company might be a strange match but that is exactly what happened when NCVRC met Computer Security Solutions, an IT security company from Johnstown.
Protecting Telecom With the Right Cyber Security Tools
Telecom fraud is estimated to cost companies almost $38 billion a year. However, the true cost is immeasurable given the damage caused to the reputation of the hacked organization, which has a trickle-down effect as clients become wary after having their information...
Ready for the right solutions?
It’s time to offload your technology troubles and security stress.