REMOVE that unwanted freeware

Like it or not, PC manufacturers LOVE to stuff your brand-new PC full of “free” applications (they get paid to do it, so you’ve got a slim chance of getting one without a side of spamware). But clutter is the enemy of a speedy PC, and if you’re not using a particular software on a regular basis, it’s best to REMOVE it completely.

If you installed it, you must update it!

There are thousands of hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Flash or Java) to access your computer. That’s why these companies frequently issue patches and updates for KNOWN security bugs; and once a KNOWN vulnerability is announced via a patch, hackers get to work like crazy trying to figure out how to use the vulnerability and access those users who are lazy about installing updates.

Bookmark the LEGITIMATE web sites you frequently visit

Here’s a sneaky trick used by many hackers: they purchase and set up a fraudulent web site that is a close misspelling of a legitimate one. Example: instead of All you have to do is accidentally fat-finger ONE letter in the URL and up pops a very legitimate-looking fake copy of the site you were trying to get to – and the login and links are full of key-logger malware and virus landmines waiting for you to click on them.

How to spot a phishing e-mail

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus.

Not all backups are created equal, what questions to ask

Not all backups are created equal, what questions to ask

Backup & Disaster Recovery Checklist

The ONLY way to completely protect your data and guarantee that you could restore it all after a major disaster is by maintaining an up-to-date copy of your data offsite in a high-security facility. 

Remote backups, also called offsite backups, online backups, or managed backups, is a service that allows you to maintain a secure copy of your data in a different location than your office.

Use STRONG passwords!

Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.

LeadingIT Lands on MSPMentor Top 501 List

Crystal Lake, Illinois / March 26th, 2015 – LeadingIT, a Chicagoland technology and cloud support company, appears at number 16 on Penton Technology’s just released MSPmentor Top 100 Small Business and at number 420 on MSPmentor 501 Global Edition. Each year the top managed service providers nationwide are hand-picked by MSPmentor, and recognized as MSPs who have shown exceptional commitment to technology, customer service and efficiency.

Tech(know)logy: An introduction

Technology can be absolutely amazing – it can remember massive amounts of things, it can blaze through an infinite number of tasks, and it can enable you to do more and do it faster. Yet many people find it daunting and downright frustrating. Most of us are open to new technology for our personal life, but less often in at work and in our professional lives.