Get Started Today!  (415) 295-4898

croom new

415 IT Blog

415 IT has been serving the San Rafael area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Control Your Profile, Part III

Control Your Profile, Part III

Social media - we can’t live with it, but we really can’t seem to live without it. People who frequently read our blog will notice how often we discuss Facebook, one of the biggest players in the social media space. Seeing as privacy is one of the biggest concerns today, we’re wrapping up our short series on Facebook by reviewing the settings you might not have realized were options on your Facebook profile.

  0 Comments
0 Comments
Continue reading

Control Your Profile, Part II

Control Your Profile, Part II

In part one of this series we started to go through Facebook privacy failings, but we didn’t really give you any information you can use. For part two, we have decided to take you through some security setting for Facebook. 

Facebook has over two billion users, and as a result, it has its fair share of privacy snafus. While they do (finally) make available all of a person’s Facebook information, their strategies to success are important reasons why there are so many privacy concerns throughout the online world. 

  0 Comments
0 Comments
Continue reading

An Experienced Endorsement for Testing Backups

An Experienced Endorsement for Testing Backups

Just because you think that you’re following best practices, doesn’t necessarily mean that you actually are. Take it from this aspiring entrepreneur, who shared his own personal experience with us, so you could benefit:

  0 Comments
0 Comments
Continue reading

Our Top 7 List of IT Myths and Wild Conspiracies

Our Top 7 List of IT Myths and Wild Conspiracies

Being in IT, we’ve seen and heard it all. Between the campfire horror stories of technicians to the outlandish IT conspiracies and ‘home remedies’ that get passed around, we’ve decided to compile a list of some of our favorite IT and technology myths.

  0 Comments
0 Comments
Continue reading

Checking in on Net Neutrality

Checking in on Net Neutrality

When we write about Net Neutrality, we typically write about how it is designed to keep the telecommunications conglomerates, who make Internet service available to individuals on the Internet, honest when laying out their Internet service sales strategy. One way to put it is that without net neutrality in place, the Big Four (which are currently Comcast, Charter, Verizon, and AT&T) have complete control over the amount of Internet their customers can access.

  0 Comments
0 Comments
Continue reading

Why You Shouldn't Say “Humbug” to Your Security

Why You Shouldn't Say “Humbug” to Your Security

The IT guy, Jacob left last month: to begin with. There is no doubt whatever about that. He left without an exit interview, and he didn’t seem very pleased with the way the situation played out. You could never tell if Scrooge cared or not. His demands have never wavered. He expected perfection and when mistakes were made, they were approached as catastrophic affronts to the sustainability of the business, even if that wasn’t the reality.

  0 Comments
0 Comments
Continue reading

How Technology Could Change the Classroom

How Technology Could Change the Classroom

Children are the future, as the saying goes, so do we really want the future to be taught using tools from the past? While some schools are still using technology that better belongs in the 20th century, others are embracing innovation and teaching in ways that better translate to the “real world.” Let’s take a look at how our evolving technology is transforming the classroom and explore some ways to get it to more students.

  0 Comments
0 Comments
Continue reading

The Force is Strong with the Internet of Things

The Force is Strong with the Internet of Things

The Internet of Things has been growing rapidly, and with this growth it has become a major part of daily life. There are connected devices you couldn’t even fathom being needed, but some have turned out to be exceeding useful. In 1977, the release of Star Wars saw people’s imaginations expand. The science end of the sci-fi went into overdrive, and soon communications and computing would change forever. Despite being a long time ago in a galaxy far, far away, the Star Wars universe introduced several concepts of the Internet of Things, decades before the IoT was even conceptualized. This week, we will take a look at the modern day Internet of Things, and how Star Wars primed us for our own future.

  0 Comments
0 Comments
Continue reading

How Technology Allows Fake News to Spread

How Technology Allows Fake News to Spread

In today’s political, social, and economic environment, information is more valuable than ever. However, this increased importance, paired with the speed that data can be dispersed via the Internet, has enabled many to use false information to manipulate the general public into agreeing with their views and acting upon them.

  0 Comments
0 Comments
Continue reading

Tip of the Week: 11 Technology Buzzwords Every SMB Should Know

Tip of the Week: 11 Technology Buzzwords Every SMB Should Know

Have you ever felt like talking to someone in the technology industry was like speaking with someone who spoke a different language? You’re not alone. It’s no secret that the IT industry loves their jargon - and has dozens of buzzwords at any given time. These are a few such words that have the industry buzzing right now!

  0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Data Backup Business Computing Network Security Data Privacy IT Support Hosted Solutions Data Recovery Software Cloud Email IT Services Malware Outsourced IT Internet Managed IT Services Tech Term User Tips Innovation Business Efficiency Hackers Windows 10 Computer Microsoft Small Business Cloud Computing Upgrade Collaboration Business Management Hardware Phishing Ransomware Google Mobile Devices Cybersecurity Business Continuity Managed Service Paperless Office Communication Workplace Tips Office 365 VoIp Android Remote Monitoring Server Backup Communications Managed Service Provider Smartphones Encryption Passwords Managed IT Artificial Intelligence Business Technology Vulnerability Internet of Things Laptops Managed IT services Browser Applications Help Desk Data Management BDR Smartphone Holiday Disaster Recovery Saving Money Wi-Fi Facebook Quick Tips Government Save Money Document Management Healthcare Mobile Device Automation Tip of the week Microsoft Office Compliance Blockchain Windows 7 Project Management Employer-Employee Relationship Avoiding Downtime Antivirus Scam Redundancy Social Media Bandwidth Processor Information Access Control BYOD Website Windows Data Security Infrastructure Vendor Management IT Management Customer Relationship Management Data Loss Two-factor Authentication Chrome Router Network VPN Analytics Machine Learning Miscellaneous RMM Recycling File Management Files Mobility Proactive Virtual Private Network The Internet of Things Company Culture Monitoring Gmail Risk Management Cooperation Server Management Word Remote Monitoring and Management Financial IoT Software as a Service Net Neutrality Gadgets Regulations Patch Management Operating System Professional Services Training Assessment Management OneDrive Hard Drive Employees Tablet File Sharing Network Management Social Network Internet Exlporer Users Consulting Downtime Dark Web Alert Consultation Employee-Employer Relationship Smart Technology Storage Maintenance HIPAA Utility Computing Bring Your Own Device Apps Remote Workers Password Networking Search Mobile Security Unified Communications Unified Threat Management Printing Notes Human Error Specifications Servers Development Operations Proactive Maintenance Solid State Drive IT Technicians Cost Management Lenovo Authentication Digital Payment Hotspot User Management Motherboard Chromebook E-Commerce Theft Connectivity Samsung Meetings Voice over Internet Protocol Projects Recovery IT Consulting Electronic Medical Records Managed IT Service Solid State Drives Payment Cards Bluetooth SharePoint Remote Worker PowerPoint Display Migration eWaste OneNote Permission Black Friday Value of Managed Services Cookies Cables Money Cybercrime Cyber security Superfish Authorization Mouse Language Teamwork Information Technology Vulnerabilities Mail Merge Features User Error Politics Return on Investment Managing Stress Data Breach Break Fix Options Telephone Office Downloads Private Cloud Permissions Chatbots How To Test Cyber Monday Staff Managed Services Websites Nanotechnology Wires Microsoft Excel Database Management Mirgation WPA3 Computing Infrastructure Shared resources Going Green Mobile Computing Address Electronic Health Records WiFi Procurement Wearable Technology Star Wars Instant Messaging Settings Personal Information Spam Enterprise Content Management Augmented Reality 5G Mobile VoIP Bookmarks ROI Google Calendar Fraud Virtual Assistant Bitcoin Identity Theft Enterprise Resource Planning Techology Manufacturing Vendor SaaS App GDPR Cache Fleet Tracking Zero-Day Threat Computing Alerts Virtualization Batteries Geography Cyberattacks Social Big Data Touchscreen Hacking Customer Service Travel Transportation Active Directory Social Networking Managed Services Provider Technology Laws Mobile Device Management Virtual Reality Wireless Internet Screen Reader Emergency Favorites Multi-Factor Security Wasting Time Current Events Identity Outlook Disaster Resistance Wireless Firewall Smart Devices Time Management Remote Computing Asset Tracking Backup and Disaster Recovery Comparison Licensing CIO applications Remote Work Heating/Cooling Modem High-Speed Internet Read Only Printer Security Cameras Flexibility Employer/Employee Relationships Apple Trending Tech Support MSP Finance Technology Tips Windows Server G Suite Point of Sale Unified Threat Management Tech Terms Data Warehousing Smart Tech Conferencing Legislation Database Mobile Shortcut Proactive IT Distributed Denial of Service Hard Disk Drives Sensors Statistics CEO Printers Students Daniel Stevens Twitter Marketing Regulation Windows Server 2008 Co-Managed IT Education

Latest Blog

We all know how important it is to protect your desktop and laptop computers from malicious threats. Installing antivirus and security software is one of the first steps you take when you get a new computer, and for good reason. An unprotected device is at great risk. With t...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...