Blog

PC PLACE Blog

PC PLACE has been serving the Redlands area since 2015, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Master Your Email with These Tips

Master Your Email with These Tips

For most people, their email inbox can get pretty intimidating. You miss a day of work for personal reasons and you probably need to schedule about double the time getting to all of the updates, responses, and junk that comes in in a short amount of time. In this month’s newsletter we thought we’d go through a few tips that can help anyone better manage their email and keep their accounts secure.

0 Comments
Continue reading

Social Engineering is Not a Risk to Underestimate

Social Engineering is Not a Risk to Underestimate

Cybercriminals will do anything they can to get what they want. They will lie and cheat to break into an organization’s network and siphon off the data or gain control. One of the most utilized tactics that cybercriminals use today is called social engineering. This month, we will discuss social engineering and how it puts everything you work for in jeopardy. 

0 Comments
Continue reading

Tip of the Week: Create Sticky Notes in OneNote

Tip of the Week: Create Sticky Notes in OneNote

Note taking apps are really useful and Microsoft OneNote is one of the most available and feature rich apps on the market for this use. You are probably familiar with the sticky note. They are notes that give a solid visual representation of items that workers need to be cognizant of for all types of processes. In today’s blog, we will go through the process of creating “sticky notes” in OneNote.

0 Comments
Continue reading

Manage Guests and External Sharing in Teams

Manage Guests and External Sharing in Teams

There will always be times when you have to invite guests and other external users to your Microsoft Teams meetings, especially if you want to take advantage of the many collaboration options offered through the platform. However, you need to be very careful with guests and external users–especially in today’s cybersecurity-centric world.

0 Comments
Continue reading

Why You Can’t Just Rip Memory from Your Computer

Why You Can’t Just Rip Memory from Your Computer

Transferring data between different computers and devices has become a routine task. Let's explore the steps you need to take before ejecting memory from a computer to ensure your data's integrity and the memory card's longevity.

0 Comments
Continue reading

Tip of the Week: Taking a Break from Social Media

Tip of the Week: Taking a Break from Social Media

In the relatively short time it has been around, social media has fully ingrained itself into our lives, personally, professionally, and socially. While there are considerable benefits to be had in all of these areas, it is also undeniable that social media can easily become overwhelming and negatively impact us. For this reason, occasionally taking a break from social media isn’t a bad idea. Let’s go over a few ways to make this break as successful and effective as possible.

0 Comments
Continue reading

Cybersecurity Needs to Be a Priority for Everyone… Especially Your Business

Cybersecurity Needs to Be a Priority for Everyone… Especially Your Business

How often does your company take it upon itself to ensure that those working for its success—your employees—are kept up to speed on cybersecurity? If your approach is to have your team sit in a room and watch a presentation once a year, it’s time to reconsider your training strategy. Let’s talk about the impact that proper cybersecurity training can have, and who tends to have access to it.

0 Comments
Continue reading

Make the Most of Your Mobile Devices with These 5 Tips

Make the Most of Your Mobile Devices with These 5 Tips

Mobile devices like smartphones have become synonymous with productivity, allowing people to get work done while on-the-move, yet in the same breath, you could say they are synonymous with distraction. With the right practices and the right apps, however, you can mitigate these challenges and be quite productive with a smartphone. Let’s explore how.

0 Comments
Continue reading

Tip of the Week: Did You Know You Could Protect a Zip File with a Password?

Tip of the Week: Did You Know You Could Protect a Zip File with a Password?

Password-protecting a file is one way to secure it from wandering eyes, particularly if you’re not the only one who uses your user profile on your computer. Windows doesn’t have built-in functionality for this type of protection, but you can use a free app called 7-Zip to do it easily enough. Let’s discuss how you can password-protect a ZIP file on your Windows computer.

0 Comments
Continue reading

Request a Consultation

Interested in seeing what we can do for your business? Contact us to see how we can help you!

Sign up today!

News & Updates

PC PLACE is proud to announce the launch of our new website at www.thepcplace.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what PC PLACE can do for your business.

PC PLACE
P.O. Box 7737
Redlands, California 92375

Copyright PC PLACE. All Rights Reserved.