I.T. Solutions of South Florida Blog

I.T. Solutions of South Florida has been serving the Lake Worth area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why You Need to Be Certain You’re Using Licensed Software

Why You Need to Be Certain You’re Using Licensed Software

Using pirated software or abusing your software licenses for your business is heavily frowned upon. However, many software companies, in an attempt to protect their products, have unleashed a practice that can actually reward those who let it happen in the first place.

Continue reading
0 Comments

Tip of the Week: Putting Your Old Android Device to Good Use

Tip of the Week: Putting Your Old Android Device to Good Use

Considering how often smartphones are replaced, you’re bound to have a couple of them stashed away for a rainy day. These devices are particularly helpful in the event that your smartphone breaks unexpectedly, but there are other purposes that you might want to keep in mind. Here are three ways you might be able to use your old mobile devices around the office.

Continue reading
0 Comments

Mike’s List of Must Have Software

Mike’s List of Must Have Software

Here’s what I can tell you about Mike….

You may or may not know Michael Lidke, he is our Operations Manager at I.T. Solutions of South Florida and he is AWESOME. For those of you who don’t know what Mike does, I’ll break it down. He’s the behind the scenes guy who runs all the scripts and patches, automates processes, synchronizes, tweaks, and all that brain bending computer stuff that most of us don’t even know is happening.

Continue reading

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

ALERT: Make Sure Your Business is Safe from Meltdown and Spectre

Intel recently found itself (once again) in hot water, mere months after many flaws were discovered in the firmware that enables all of their chips to do their job. This time, the issue could have potentially caused a permanent dip in the CPU’s capacity to function properly. This has come to be known as the Meltdown vulnerability.

Continue reading
0 Comments

According to Study, Only 28% Utilize Two-Factor Authentication

According to Study, Only 28% Utilize Two-Factor Authentication

2FA, or two-factor authentication, is a simple and effective means of boosting your cybersecurity. Despite this, a study performed by Duo Labs suggests that 2FA has not been adopted as much as one might expect, or as much as it should be.

Continue reading
0 Comments

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Privacy Best Practices Cloud Hackers Business IT Services Internet Hosted Solutions Business Computing IT Support Productivity Malware Email Backup Managed Service Provider Computer Microsoft Hardware Windows 10 Small Business Internet of Things Data Managed IT Services Workplace Tips Mobile Devices Business Continuity Network Disaster Recovery Google Mobile Device Management Office Communication Smartphone Microsoft Office Miscellaneous Ransomware Spam Social Media Virtualization BYOD Gmail Innovation VoIP WiFi Outsourced IT Hacking User Tips Phishing Passwords App Saving Money Recovery Wireless Technology Efficiency Big Data Upgrade Server Windows Smartphones Data Management Office Tips Bring Your Own Device Vendor Management Budget Data Backup Customer Service Software Password Browser Employer-Employee Relationship Facebook Presentation Apple Android Holiday IT solutions Network Security Hard Drives User Social Administration Two-factor Authentication Avoiding Downtime Data storage Virtual Desktop Business Growth Tech Support Mobile Computing Hosted Solution Competition Business Owner Best Practice Chrome Operating System Hacker Marketing Information Technology Settings Encryption Robot Analytics Apps Lithium-ion battery LiFi End of Support Mobile Device Running Cable Artificial Intelligence Safety Computers Managed IT Content Filtering Website Cybercrime Florida Risk Management Wireless Data Recovery IT service Customer Relationship Management Firewall Outlook Humor Analyitcs Going Green The Internet of Things Retail Writing Users Solid State Drive Education Office 365 VPN Superfish Refrigeration Training Printing Trending IBM Fishing Google Docs Social Engineering Augmented Reality Specifications File Sharing PowerPoint Computing CIO Tournament Alt Codes Fun Cost Management Files Google Wallet User Error Entrepreneur Storage Compliance Typing Search Drink Drones communications Save Money eWaste Business Management Assessment Dark Data Regulations Cryptocurrency Remote Monitoring Heating/Cooling Undo Geek Money Unified Communications IP Address Environment Consultation Flexibility Bitcoin Hiring/Firing Bytes Mouse Laptop Downtime Mobile Office Troubleshooting MSP Consumers Windows 8 Cortana Business Intelligence Computer Care Save Time Halloween YouTube MSPmentor Network Congestion Hacks Phone System Backups Scary Stories Deep Learning Word Display Help Desk Remote Computing Knowledge Domains Engineer Legal Sports Wi-Fi Redundancy Monitors SaaS Current Events Experience iPhone Application Public Speaking Technical Gadgets Identities Bandwidth 5G Lenovo Automation Telephony Co-managed IT Proactive Google Drive Buisness

Blog Archive

Upcoming Events

No events