Get Started Today!  (415) 295-4898

croom new

415 IT Blog

415 IT has been serving the San Rafael area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

The Night Before Christmas (A Visit from St. Isidore)

The Night Before Christmas (A Visit from St. Isidore)

‘Twas the night before Christmas, and with all the work done,
The office was closing for some holiday fun;
Their coats buttoned up, they had all saved their files,
Everyone’s face creased in a big, toothy smile.

  0 Comments
0 Comments
Continue reading

Control Your Profile, Part III

Control Your Profile, Part III

Social media - we can’t live with it, but we really can’t seem to live without it. People who frequently read our blog will notice how often we discuss Facebook, one of the biggest players in the social media space. Seeing as privacy is one of the biggest concerns today, we’re wrapping up our short series on Facebook by reviewing the settings you might not have realized were options on your Facebook profile.

  0 Comments
0 Comments
Continue reading

Control Your Profile, Part II

Control Your Profile, Part II

In part one of this series we started to go through Facebook privacy failings, but we didn’t really give you any information you can use. For part two, we have decided to take you through some security setting for Facebook. 

Facebook has over two billion users, and as a result, it has its fair share of privacy snafus. While they do (finally) make available all of a person’s Facebook information, their strategies to success are important reasons why there are so many privacy concerns throughout the online world. 

  0 Comments
0 Comments
Continue reading

An Experienced Endorsement for Testing Backups

An Experienced Endorsement for Testing Backups

Just because you think that you’re following best practices, doesn’t necessarily mean that you actually are. Take it from this aspiring entrepreneur, who shared his own personal experience with us, so you could benefit:

  0 Comments
0 Comments
Continue reading

Our Top 7 List of IT Myths and Wild Conspiracies

Our Top 7 List of IT Myths and Wild Conspiracies

Being in IT, we’ve seen and heard it all. Between the campfire horror stories of technicians to the outlandish IT conspiracies and ‘home remedies’ that get passed around, we’ve decided to compile a list of some of our favorite IT and technology myths.

  0 Comments
0 Comments
Continue reading

Checking in on Net Neutrality

Checking in on Net Neutrality

When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.

  0 Comments
0 Comments
Continue reading

Why You Shouldn't Say “Humbug” to Your Security

Why You Shouldn't Say “Humbug” to Your Security

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

  0 Comments
0 Comments
Continue reading

How Technology Could Change the Classroom

How Technology Could Change the Classroom

Children are the future, as the saying goes, so do we really want the future to be taught using tools from the past? While some schools are still using technology that better belongs in the 20th century, others are embracing innovation and teaching in ways that better translate to the “real world.” Let’s take a look at how our evolving technology is transforming the classroom and explore some ways to get it to more students.

  0 Comments
0 Comments
Continue reading

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

  0 Comments
0 Comments
Continue reading

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

  0 Comments
0 Comments
Continue reading

Tip of the Week: 11 Technology Buzzwords Every SMB Should Know

Tip of the Week: 11 Technology Buzzwords Every SMB Should Know

Have you ever felt like talking to someone in the technology industry was like speaking with someone who spoke a different language? You’re not alone. It’s no secret that the IT industry loves their jargon - and has dozens of buzzwords at any given time. These are a few such words that have the industry buzzing right now!

  0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data Backup Data IT Support Network Security Hosted Solutions Privacy Cloud Data Recovery Software IT Services Email Malware Outsourced IT Internet Managed IT Services Tech Term Efficiency Business Innovation Computer Windows 10 Upgrade User Tips Cloud Computing Small Business Hackers Microsoft Hardware Mobile Devices Phishing Business Management Collaboration Workplace Tips Cybersecurity Ransomware Google Business Continuity VoIp Paperless Office Managed Service Backup Smartphones Android Communication Server Office 365 Managed Service Provider Encryption Communications Remote Monitoring Managed IT Internet of Things Passwords Data Management BDR Artificial Intelligence Holiday Vulnerability Business Technology Saving Money Wi-Fi Facebook Help Desk Save Money Document Management Quick Tips Government Windows 7 Mobile Device Healthcare Managed IT services Browser Applications Smartphone Miscellaneous Laptops Disaster Recovery Scam Redundancy Social Media Bandwidth Automation Tip of the week Microsoft Office Compliance Network Blockchain Processor Avoiding Downtime Project Management Employer-Employee Relationship Information Antivirus Router Maintenance VPN Analytics Machine Learning Website Access Control BYOD Virtualization Windows Data Security Vendor Management Infrastructure Software as a Service IT Management RMM Customer Relationship Management Data Loss Chrome Two-factor Authentication Monitoring Payment Cards Storage Bring Your Own Device HIPAA Utility Computing Financial Remote Monitoring and Management Networking Operating System Mobile Security OneDrive Professional Services Training Search Unified Threat Management Employees Unified Communications Recycling Consulting Downtime Files Social Network Employee-Employer Relationship Virtual Private Network Mobility The Internet of Things Company Culture Gmail Managed Services Provider Cooperation Server Management Risk Management Remote Workers Password Apps Word Net Neutrality Gadgets Regulations Patch Management IoT Management Co-Managed IT Assessment Tablet File Sharing Hard Drive Internet Exlporer Users File Management Dark Web Network Management Consultation Smart Technology Alert Proactive Electronic Medical Records Computing Alerts Solid State Drives Geography Meetings Voice over Internet Protocol Projects Cache OneNote Permission Travel Value of Managed Services Social Networking Technology Laws Remote Worker Virtual Reality Touchscreen Hacking PowerPoint Display Business Telephone Teamwork Information Technology Identity Outlook Disaster Resistance Features Firewall Time Management Cybercrime Cyber security Screen Reader Emergency Multi-Factor Security Virtual Machines Authorization Comparison Licensing Heating/Cooling Options Telephone Modem High-Speed Internet Printer Politics Return on Investment Remote Computing How To Test Technology Tips Managed Services G Suite Unified Threat Management Office Private Cloud Data Warehousing Flexibility Trending Tech Support IT Assessment Shared resources Going Green Mobile Shortcut Proactive IT Electronic Health Records Procurement Distributed Denial of Service Statistics Database Management Smart Tech Credit Cards WPA3 Legislation Specifications Servers 5G Mobile VoIP Development Instant Messaging Settings Personal Information Digital Payment Hotspot Manufacturing Vendor Motherboard Chromebook Bookmarks ROI Operations Virtual Assistant Bitcoin IT Technicians Cost Management Lenovo Recovery Batteries IT Consulting Cyberattacks Social Managed IT Service Bluetooth GDPR Connectivity Samsung Computers Fleet Tracking Zero-Day Threat Active Directory Migration eWaste Mobile Device Management Black Friday Wireless Internet Big Data Cookies Cables SharePoint Windows Server 2008 Customer Service Transportation Superfish Wireless Mouse Language Smart Devices Vulnerabilities Mail Merge User Error Favorites Money Wasting Time Current Events CIO applications Remote Work Managing Stress Data Breach Read Only Security Cameras Break Fix Holidays Asset Tracking Backup and Disaster Recovery Windows Server Chatbots Point of Sale Tech Terms Cyber Monday Staff Websites Employer/Employee Relationships Apple Nanotechnology Wires Downloads MSP Finance Permissions Computing Infrastructure Hard Disk Drives Sensors Mobile Computing Address WiFi Conferencing Microsoft Excel Database Mirgation Human Error Spam Enterprise Content Management Printing Augmented Reality Notes Wearable Technology Star Wars IT User Management Identity Theft Enterprise Resource Planning Techology E-Commerce Theft SaaS Proactive Maintenance Solid State Drive App Optimization Authentication Google Calendar Fraud Daniel Stevens Regulation Digitize Marketing Twitter Education CEO Printers Students

Latest Blog

All work and no play makes Jack a dull boy, as the saying goes, but is this really useful advice if you’re trying to keep Jack, Jill, and the rest of your team engaged in the workplace? As it happens, it is! Let’s explore how you can use gamification to your business’ benefi...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...