How to spot a phishing e-mail

A phishing e-mail is a bogus e-mail that is carefully designed to look like a legitimate request (or attached file) from a site you trust in an effort to get you to willingly give up your login information to a particular web site or to click and download a virus.

Not all backups are created equal, what questions to ask

Not all backups are created equal, what questions to ask

Backup & Disaster Recovery Checklist

The ONLY way to completely protect your data and guarantee that you could restore it all after a major disaster is by maintaining an up-to-date copy of your data offsite in a high-security facility. 

Remote backups, also called offsite backups, online backups, or managed backups, is a service that allows you to maintain a secure copy of your data in a different location than your office.

Use STRONG passwords!

Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.

LeadingIT Lands on MSPMentor Top 501 List

Crystal Lake, Illinois / March 26th, 2015 – LeadingIT, a Chicagoland technology and cloud support company, appears at number 16 on Penton Technology’s just released MSPmentor Top 100 Small Business and at number 420 on MSPmentor 501 Global Edition. Each year the top managed service providers nationwide are hand-picked by MSPmentor, and recognized as MSPs who have shown exceptional commitment to technology, customer service and efficiency.

Tech(know)logy: An introduction

Technology can be absolutely amazing – it can remember massive amounts of things, it can blaze through an infinite number of tasks, and it can enable you to do more and do it faster. Yet many people find it daunting and downright frustrating. Most of us are open to new technology for our personal life, but less often in at work and in our professional lives.