Out of the Box Solutions Blog

Out of the Box Solutions has been serving the Michigan area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses

The Wild Ride That Is Data Privacy, Part II

Earlier this week, we published the first part of our blog, “The Wild Ride That Is Data Privacy” where we went over the systems in place in society that are designed to put your privacy at risk. We continue the article today. Please visit our blog to re.

0 Comments
Continue reading

The Wild Ride That Is Data Privacy, Part I

Data Privacy is a huge topic these days. We often talk about data security when it comes to protecting your organization’s information, but we often don’t go into a lot of depth when it comes to protecting an individual’s information. It’s important to understand how personal information moves around, so you know what you are up against when it comes to protecting your privacy online. This post is going to be a bit of a deep rabbit hole, but I really want to shine some light on the subject for my readers.

0 Comments
Continue reading

Google Location Services and How They Apply to the Average User

In the dog days of summer, the news media started running a story about how Google’s location tracking services continue to track people even after they order their mobile device’s OS to quit it. A researcher from Princeton proved these claims by traveling through New York and into New Jersey after turning location services off on for hi Android smartphones, only to be tracked through all the Interstate travel. We’ll take an in-depth look at why Google seemingly knows exactly where you are if you want them to or not.

0 Comments
Continue reading

Taking a Look at Facebook’s Recent Controversies

The past few years certainly haven’t been very good for Facebook. After going public in 2012, Facebook acquired several organizations and applications to make waves in the market. The company is now responsible for a considerable amount of data, which has led to several data breaches, exacerbating the media and creating skepticism toward the social media giant.

0 Comments
Continue reading

How Your Kids Can be Hurt by Devices (and Vice Versa)

As technology advances and improves at an exponential rate, it is little wonder that today’s youth are growing up with a closer relationship to technology than any other generation before them. While this has opened up many beneficial opportunities for them, it can also be the source of many serious issues without the proper supervision.

0 Comments
Continue reading

Sexy Scam Relies on Your Belief that Someone Was Watching

Internet scams are major threats to individuals and business because all it takes is one wrong click of the mouse and a user is embroiled in an unenviable situation. One such scam that is happening today is designed to catch users with their pants down, so to speak.

0 Comments
Continue reading

Tip of the Week: Improving Your Online Privacy

Most users are aware that their browsers offer a “secure” browsing experience. Google Chrome has Incognito mode, Microsoft’s Edge browser allows you to surf the Internet “InPrivate,” and Apple’s Safari offers Private Browsing as well. The trouble is, these “secure” browsing options aren’t actually all that secure. For today’s tip, we’ll discuss ways to actually keep your Internet browsing private.

0 Comments
Continue reading

Password Security Needs to Be a Priority

Passwords are everywhere. It seems that every account requires a password, in addition to the devices we use to access these accounts. This is a good thing, as it only helps to increase security - assuming that the password is strong. After all, a password that anyone can guess can hardly be called a password at all.

0 Comments
Continue reading

Your Computer Might Be Sharing Data with its Manufacturer

It is our hope that you are aware of how much of a risk spyware can pose to your business. Your business generates, collects, and leverages truly considerable amounts of data each day that is intended for your business only. While spyware that is introduced by a hacker is clearly a bad thing, what if the manufacturer of the device installed a program that pulled data from your machine?

0 Comments
Continue reading

Are You Guilty of These Careless Security Flaws?

Did you know that a surprising number of data breaches are the result of insider threats? Insider threats are defined as data exposure, either malicious by nature or unintentional, that results from the actions of an employee in your workforce. With so many threats out there, it’s easy to forget that some of the most dangerous are right within your walls. How can you keep insider threats from becoming a major problem for your organization?

0 Comments
Continue reading

How Safe is Your Email?

Email is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Michigan small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

0 Comments
Continue reading

What is your Identity Worth to You?

Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Business Computing Network Security Productivity Efficiency User Tips Malware Communication Privacy Data Microsoft Mobile Device Internet Google Hackers Tech Term Hardware Smartphones IT Support Computer Innovation Ransomware Email Windows 10 Users Cybersecurity Android Small Business Communications Business Management Managed IT Services Browser Network Passwords Software Mobile Devices IT Services Cloud Business Workplace Tips Collaboration VoIp Information Applications Outsourced IT Managed Service Managed IT services Data Backup Business Intelligence Employer-Employee Relationship Hosted Solutions Wi-Fi Data recovery Internet of Things Wireless Holiday Backup Saving Money Smartphone Apps Social Media Cloud Computing Bandwidth Blockchain Gmail Marketing Gadgets Miscellaneous Save Money Networking Microsoft Office Upgrade Value Laptop Windows Mobility Wireless Charging Voice over Internet Protocol Office 365 Cortana Data Security Quick Tips Net Neutrality Compliance Virtualization VPN Telephony Processor G Suite BDR RAM Data Management Remote Monitoring and Management Computers Tech Terms Access Control Automation Managed IT Service Connectivity Company Culture Medical IT Remote Computing Chrome Paperless Office Patch Management Facebook Artificial Intelligence Cost Management Analytics Office Healthcare Virtual Assistant Password Twitter Telecommuting Authorization Chrome OS Digital Data loss Router Vulnerabilities Vulnerability Machine Learning Database Knowledge Plug-In Wireless Internet Online Shopping Updates Streaming Media Tip of the week Environment Phishing Update OneNote Government PowerPoint Content Filtering GDPR Inventory Unified Communications Spam Employees Websites Internet Explorer Comparison Training IT Management Touchscreen Cryptocurrency Spyware Cybercrime Proactive IT Help Desk Backup and Disaster Recovery Downloads User Tip WannaCry Server Management e-waste Data Breach Outlook Big Data Windows Server 2008 R2 Sports Personal Information Data Protection Workers Human Resources Edge Virus Solid State Drive Safety Threat Specifications Security Cameras Server Microsoft Office 365 Windows 7 HP Tactics Voice over IP Business Continuity Settings Display Hard Drives Trends E-Commerce HIPAA disposal Bring Your Own Device Sales Profitability Taskbar Storage Mobile Security Microsoft Teams Millennials Employee-Employer Relationship Antivirus Hard Disk Drive Printing Reporting Word Time Management Document Management Telecommute IT budget Benchmarks SSD A.I. Dark Web Payment Hard Drive Hybrid Cloud Tablet Amazon Eliminating Downtime Physical Security National Security Operating System Business Technology Electronic Health Records Staff Video Dongle Paper Conferencing Wearables Lead Generation Network Attached Storage Movies Authentication Maintenance Analysis Certification Battery Risk Management Error instant Messaging Processors Cables Excel BYOD eCommerce Technology Tips Managing Stress Troubleshooting Health Customer Service Ink SaaS Financial Disaster Recovery Regulation Alert Printers