Get Started Today!  (415) 295-4898

croom new

415 IT Blog

415 IT has been serving the San Rafael area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

Android Apps Suddenly Crashing? You May Have Had a Bad Update

Android Apps Suddenly Crashing? You May Have Had a Bad Update

Google’s Android operating system has about a 71.9 percent global market share, making it the most used smartphone operating system in the world. It’s well-trusted, and although the experience differs since phone manufacturers customize Android to fit their device, generally the operating system is pretty stable. This wasn’t the case for a massive number of users around March 22nd, 2021.

  0 Comments
0 Comments
Continue reading

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Do Google’s New Policies on User Data Privacy Indicate Larger Changes?

Just in case you haven’t been paying attention, online privacy has been highlighted significantly in recent years—in no small part due to the sale of our profiles by the tech giants that provide today’s most (in)famous websites… including and especially Google. Having said this, it is also important to acknowledge that some of Google’s recent policy changes could suggest that this may change at some point.

  0 Comments
0 Comments
Continue reading

Google Search Now Gives More Info into What You’re Clicking On

Google Search Now Gives More Info into What You’re Clicking On

While Google Search has become eponymous for “online search”, the company has not stopped innovating upon the capabilities of the service. Most recently (as of this writing, of course) one improvement that the company is making is to give more content a bit more context before a user clicks through to a potential threat.

  0 Comments
0 Comments
Continue reading

How to Make Your Google Account More Secure

How to Make Your Google Account More Secure

Going through your passwords and updating them every so often is a very wise habit to get into, particularly when they are used to protect a lot of data—as the password to your Google account often is. Considering this, let’s go over how to update your Google password and otherwise lock down your account.

  0 Comments
0 Comments
Continue reading

Homeland Security is Warning Businesses to Update Google Chrome

Homeland Security is Warning Businesses to Update Google Chrome

We realize that it’s one thing for us to tell you how important it is to update your software. After all, we’re tech guys, so we worry about that kind of thing all the time. Hopefully, it’s quite another matter when Homeland Security does it, which is why we’re really hoping that you take heed of this warning and update Google Chrome.

  0 Comments
0 Comments
Continue reading

Tip of the Week: Making the Most of Google Keep

Tip of the Week: Making the Most of Google Keep

The Android platform has various tools and applications available to assist users in keeping themselves organized and productive. One of these applications, Google Keep, offers particularly significant benefits. For this week’s tip, we’ll be going over some ways that you can use Google Keep to help “keep” track of the cornucopia of important information you need to process and retain.

  0 Comments
0 Comments
Continue reading

A Security Briefing on Chrome Extensions

A Security Briefing on Chrome Extensions

Did you know that, as of July 2020, 69 percent of global desktop Internet users utilized Google Chrome as their browser of choice? With such a large market share, the security associated with Google Chrome is important to keep in mind. To help increase some of this awareness, we wanted to talk about Chrome’s many extensions and the permissions they are too often granted, with minimal awareness from the user.

  0 Comments
0 Comments
Continue reading

This Chrome Bug Could Affect Billions

This Chrome Bug Could Affect Billions

Data and cybersecurity is hard enough without vulnerabilities coming from one of your most utilized applications. That’s the scenario after a bug was found in some of today’s most popular Internet browsers putting billions of people’s data security at risk. Let’s take a brief look at the vulnerability and how you can ensure that it won’t be a problem for you or your company.

  0 Comments
0 Comments
Continue reading

Tip of the Week: Searching Google More Specifically

Tip of the Week: Searching Google More Specifically

Everyone knows how to do a Google Search, right? Go to the site, type whatever it is you’re looking for into the search bar, and you’re off to the races. Fewer people are aware, however, of the ways that you can help Google narrow its search a bit. Let’s go over a few handy Google cheat codes that can make your search results more precise.

  0 Comments
0 Comments
Continue reading

I Didn’t Realize How Much I Needed This: Color-Coded Chrome Tabs

I Didn’t Realize How Much I Needed This: Color-Coded Chrome Tabs

Google Chrome is rolling out a neat little update for everyone over the next week (it may already be out for some users by the time this posts). It’s a feature that I know I’m personally going to love, and I didn’t even realize how badly I needed it until now.

Let’s take a look!

  0 Comments
0 Comments
Continue reading

Google Adding Features to the G Suite

Google Adding Features to the G Suite

It is apparent that Google is deeply invested in the G Suite, as they recently added an assortment of features to make basic processes much simpler and more convenient for their users. Here, we’ll go over a few of these updates, and how they can positively influence your operations.

  0 Comments
0 Comments
Continue reading

Tech Giants Are in on AR

Tech Giants Are in on AR

Augmented reality has been one of the most cited emerging technologies for the past few years. It was the technology that was supposed to fuel Google Glass, the failed attempt at creating a pair of revolutionary smart glasses. Since then, there hasn’t been much press about AR in the mainstream media and not much is known about major tech companies’ attempts to improve AR technology. 

  0 Comments
0 Comments
Continue reading

Google Password Checkup Tool Works to Keep You Secure

Google Password Checkup Tool Works to Keep You Secure

Imagine a world where there wasn’t a singular dishonest being. Passwords would simply vanish from our everyday lives, as we would not be paranoid of a breach or other forms of cybercriminal activity. The harsh reality is this will never become reality. Even worse, the cybercriminals don’t just skim for lack of passwords. Instead, the dishonest criminal goes even further; they take advantage of common or recurring passwords. So how do you know if your password practices are leaving you vulnerable? Google is here to help. 

  0 Comments
0 Comments
Continue reading

Tip of the Week: Some Google Search Tips to Help You

Tip of the Week: Some Google Search Tips to Help You

For many tech-savvy individuals, the expression “Google it” is a well-tested, and approved, method to researching. Are you getting the most out of Google search? Today, we share useful tips on how to better optimize your Google search queries.

  0 Comments
0 Comments
Continue reading

Tip of the Week: Optimize Your Chrome Browser

Tip of the Week: Optimize Your Chrome Browser

Google Chrome is much more than just any old web browser; it’s the most popular web browser in the world, being installed automatically on Android smartphones and the browser of choice for countless desktop users. Today, we want to help you get the most out of your Google Chrome web browser.

  0 Comments
0 Comments
Continue reading

Google Knows Where You Are: Here’s How to Stop Them

Google Knows Where You Are: Here’s How to Stop Them

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated Press, traveling through New York and New Jersey with locations services off only to be tracked the entire way. Today, we will discuss this issue, and tell you what you need to know to keep Google from tracking you wherever you go.

  0 Comments
0 Comments
Continue reading

Prioritize the Protection of Your Google Account

Prioritize the Protection of Your Google Account

Chances are you have a Google account, whether it’s for business or personal use. It’s more accessible today than ever before and provides a solid way to gain access to several important features and accounts. Considering how much can be done with a Google account, users forget that they can put their security and personal data at risk. Here are some ways that your Google account is at risk, as well as what you can do to fix it.

  0 Comments
0 Comments
Continue reading

Clearing Up Some Chromebook Confusion

Clearing Up Some Chromebook Confusion

Chromebooks might be simple, but they aren’t as limited as you might think they are. They might have once been limited, but more recent models are much more capable of accomplishing just as much, if not more, than any of their previous iterations. Here are some of the most common misconceptions that people have about Chromebooks.

  0 Comments
0 Comments
Continue reading

The G Suite Just Got Smarter

The G Suite Just Got Smarter

With the recent overhaul of Google’s G Suite productivity software products comes a new way to keep your business’ data secure. We’ll go over some of the major changes introduced in the updates, including the integration of artificial intelligence.

  0 Comments
0 Comments
Continue reading

Tip of the Week: Managing Gmail with Labels and Filters

Tip of the Week: Managing Gmail with Labels and Filters

Gmail is a great way to take advantage of business email, but do you know all of the ins and outs of how to use some of its finer details? Today’s tip is dedicated to going over some of the more useful features of Gmail, like filters and labels--both of which will be helpful in controlling your inbox.

  0 Comments
0 Comments
Continue reading

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Technology Productivity Best Practices Business Computing Data IT Support Network Security Data Backup Privacy Cloud Hosted Solutions Internet IT Services Software Data Recovery Business Efficiency Email Managed IT Services Hackers Small Business Google User Tips Mobile Device Innovation Phishing Malware VoIp Communication Collaboration Hardware Business Management Workplace Tips Cybersecurity Outsourced IT Computer Backup Upgrade Android Cloud Computing Smartphone Managed Service Quick Tips Mobile Devices Tech Term Microsoft Business Continuity Windows 10 Disaster Recovery Covid-19 Smartphones Communications Ransomware Passwords Remote Work Managed Service Provider Users Saving Money Paperless Office Network Encryption Browser Office 365 Remote Monitoring Business Technology Data Management Wi-Fi Windows BDR Server Internet of Things Artificial Intelligence Managed IT Social Media Compliance Help Desk Vulnerability Holiday Save Money Document Management Government Healthcare Microsoft Office Windows 7 Employer-Employee Relationship Virtualization Scam Chrome Health Miscellaneous Remote Laptops Facebook Information Automation Data Security Applications Managed Services Blockchain Managed IT services Office Mobile Office Vendor Management Two-factor Authentication Gadgets Redundancy Processor Avoiding Downtime Machine Learning Analytics Antivirus Wireless Bandwidth BYOD Meetings Training Infrastructure Project Management Tip of the week WiFi Data Loss Storage Employees Router Password Maintenance IT Management HIPAA Employee-Employer Relationship VPN Customer Relationship Management Networking Apps Website Files Access Control Company Culture Virtual Private Network RMM Time Management Information Technology Proactive OneDrive Regulations IoT Patch Management Remote Worker Hard Drive Mobility Software as a Service Net Neutrality Vendor Spam Operating System Tablet Server Management Internet Exlporer Big Data Dark Web Augmented Reality Electronic Health Records Alert Smart Devices Instant Messaging Smart Technology Bring Your Own Device Current Events Consulting Downtime Utility Computing Holidays Assessment Computing Remote Computing Co-Managed IT Customer Service Managed Services Provider Mobile Device Management Network Management Search File Management Consultation Mobile Remote Workers Mobile Security Recycling Flexibility Payment Cards Voice over Internet Protocol Unified Communications Conferencing Display Free Resource Telephone Authentication Gmail The Internet of Things Word Cooperation Professional Services Monitoring Data Storage Unified Threat Management Risk Management Management Data Breach Money Images 101 Remote Monitoring and Management File Sharing Social Network Financial Manufacturing Politics Digitize Ergonomics Recovery Cyber Monday Staff Enterprise Content Management Virtual Assistant Bitcoin Address CRM Bluetooth Permissions Wearable Technology Star Wars Computers Private Cloud Customer Relationships Computing Infrastructure Identity Theft Enterprise Resource Planning GDPR How To Test Microsoft Excel App Batteries Cache Wireless Internet WPA3 Techology Geography Transportation Active Directory Windows Server 2008 Procurement Gifts Shadow IT Vendors Social Networking Wasting Time Content Filtering Google Calendar Fraud Bookmarks ROI Innovations Alerts Identity Technology Laws Websites Screen Reader CIO applications Travel Employer/Employee Relationships Fleet Tracking Outlook Apple Zero-Day Threat Disaster Resistance Outsource IT Virtual Reality Modem High-Speed Internet Windows Server Cyberattacks Emergency Social Multi-Factor Security Hacker Hard Disk Drives Sensors Outsourcing Analysis Firewall G Suite Database Printer Tech Support Favorites IT YouTube Comparison Licensing Notes Unified Threat Management Peripheral SaaS Smart Tech Technology Tips Proactive Maintenance Asset Tracking Shortcut Solid State Drive Backup and Disaster Recovery Proactive IT Laptop Data Warehousing Development User Management Read Only Optimization Security Cameras CES Solid State Drives MSP Finance Video Conferencing 2FA Distributed Denial of Service Motherboard Chromebook Projects Point of Sale Tech Terms Banking Touchscreen Hacking Legislation IT Technicians Cost Management Value of Managed Services Lenovo Business Telephone Videos Specifications PowerPoint PCI DSS Connectivity Digital Payment Hotspot Migration eWaste Cybercrime Cyber security Human Error IT Consulting Remote Working Heating/Cooling Operations Cookies Cables Teamwork Samsung Virtual Machines Printing Options Biometric Managed IT Service Vulnerabilities Return on Investment E-Commerce Theft SharePoint Reviews Trending Superfish IT Assessment Media Black Friday Managing Stress Mail Merge Electronic Medical Records User Error Statistics Mouse Language Chatbots Database Management OneNote Permission Budget Servers Nanotechnology Wires Shared resources Going Green Credit Cards 5G Mobile VoIP Authorization Gamification Break Fix Mobile Computing Settings Personal Information Features Downloads End of Support Mirgation Marketing Regulation Education CEO Students Daniel Stevens Printers Twitter

Latest Blog

The first half of this year has seen its fair share of ups and downs, especially on a global scale. With a global pandemic still taking the world by storm, it’s despicable that hackers would take advantage of the opportunity to make a quick buck using phishing tactics. Yet, ...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...