Author: Ty Hedden

Types of viruses

In this video, vCIO Ty Hedden outlines different types of computer viruses. A virus simply put in a malicious piece of software that can steal your personal information or data and take control of your computer to run malicious tasks in the background. Types Spyware...

Pod Pointer – Ignore Outlook conversations

You’ll want to be careful with this tip because it effectively creates a rule to delete messages that match specific criteria. If you’re being bombarded with an ongoing email thread you can right click on any email in the conversation and choose Ignore.  All previous...

Microsoft Word tip

Who has time to indent, anyway? If you're as busy as I am you like to save time anywhere possible.  Don't waste any more time hitting tab to manually indent paragraphs in Microsoft Word - try this instead: For newer versions of Microsoft Word: Find the Paragraph...

Two-step verification

Security is a funny thing, more of an illusion most of the time, shattered into pieces when a critical system is compromised. For most of us email is the weakest link, an opening to the rest of the things we need to keep secure. What damage could be done by somebody...

Reopen that tab!

If you've accidentally closed a tab in your browser, most modern browsers let you reopen that tab with this command: CTRL + SHIFT + T Run the command again and it will open the tab that you closed before that.  And so on. That's it, that's all!  If you're itching for...

Don’t shoot the messenger

There is one particular conversation I get myself into which often results in dirty looks and disbelief coming my way. This would be the age old debate about Macs and viruses. I'm going to lay it on you right here and now, whether you like it or not: Macs get viruses....

Unsecured Wifi

Ah, wireless internet, not just a convenience these days but a necessity. How far into the woods would you need to go to not find any wireless networks? Better yet, how about unsecured wireless networks? I remember reading an article a couple of years ago about how it...

DDOS Attack On March 14th

A service provider we utilize was recently targeted by what is referred to as a Distributed Denial Of Service attack, or DDOS for short. A DDOS attack involves flooding a server (or network) with so many packets of information that it renders the server inoperative....