Give us a call

Ferrum Technology Services Blog

Ferrum Technology Services has been serving the Elgin area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Here’s the Easiest Way We’ve Found to Merge 2 Email Accounts

b2ap3_thumbnail_email_merge_400.jpgIf you’ve been a computer user for some time, there is a distinct possibility that you have more than one email account. At the very least you have your home address, and it’s increasingly likely that your college, your place of employment, your ISP, or some other organization has issued some sort of email address. There is now a way to combine these accounts into a single email address of your choice.

0 Comments

Tip of the Week: Adjust Camera Settings and Resize Pictures to Better Store/Share Your Digital Photos

b2ap3_thumbnail_images_resize_400.jpgThanks to so many people carrying camera-equipped smartphones, our society is inundated with photos like never before. For many of us, sharing and posting pictures has become second nature. Although, not everyone is aware of just how large the file size of pictures can potentially be, and why large photos can be problematic.

0 Comments

Tip of the Week: 3 Reasons Why Skipping Your Breaks Can Hinder Productivity

b2ap3_thumbnail_take_a_break_400.jpgWe live in an age where productivity is at its peak, but as you might be aware, this often leads to a stressful work environment where anything less than your best can be considered slacking. You might have several tasks that need to be completed today, but we’re sure you can take the time to read this blog about giving yourself a break once in awhile. You might find that breaks are absolutely crucial to both your creative and physical well being.

0 Comments

4 Easy Ways to Take Control of Your Network’s Cables

b2ap3_thumbnail_cabling_your_technology_400.jpgUntil we’ve reached a day where wires are obsolete and every device connects wirelessly to its needed network, wires and cables will always be an integral part of your company’s IT infrastructure. Since you’re stuck having to deal with wires, you might as well know how to effectively manage your cables so that they’re not slowing you down.

0 Comments

Do We REALLY Need to Explain Why You Shouldn’t Stab Batteries With a Knife? [VIDEO]

b2ap3_thumbnail_smartphone_battery_400.jpgFollowing in the iPhone’s footsteps, it’s been confirmed that Samsung mobile devices will no longer feature the removable battery and MicroSD card slots that differentiated them from its competition. While it’s not clear if this change will affect sales figures, it will probably be a while before Samsung users understand that their phones no longer feature removable batteries, which could lead to some potentially messy lawsuits.

0 Comments

Harness the Power of the Tomato to Get More Work Done [VIDEO]

b2ap3_thumbnail_pomodoro_technique_timer_400.jpgHave you ever wondered how in the world you’re going to get everything done, only to lose track of everything or get distracted? Some researchers believe that the tomato might be the key to unlocking the latent knack for productivity that lies dormant within us all. Albeit, not a real tomato, but the familiar tomato-shaped timer that counts down from 25 minutes.

0 Comments

Tip of the Week: How to Learn from Your Competitors

b2ap3_thumbnail_tip_watch_your_competitors_400.jpgNo matter what kind of business you run, you’re likely to gain many friends and allies in the war of entrepreneurship. However, you’ll also gain a lot of enemies (i.e. your competitors) that you’ll need to one-up somehow. Of course, you could always just exploit what they are doing wrong, but what about what they are doing right?

0 Comments

Tip of the Week: How to Choose a Good PIN for Your Credit Card

b2ap3_thumbnail_creditcard_security_400.jpgIdentity theft is commonplace on the Internet, and if you’re not careful with how you approach your browsing, you could potentially leak sensitive information to hackers. Unfortunately, some people are so concerned with protecting their other information, like Social Security numbers or dates of birth, that they forget that their PIN number is just as vulnerable to hacking as ever.

0 Comments

3 Warning Signs That Can Reveal Your IT Staff’s True Colors

b2ap3_thumbnail_employee_true_colors_400.jpgYour IT staff deals with your technology on a daily basis, and that same technology is necessary for your company’s survival. In a sense, your IT staff holds the future of your business in their hands. This tremendous responsibility demands a certain level of trust from the business owner, but sometimes they might have other ulterior motives in mind. How can you tell if you’re being fooled by your IT staff?

0 Comments

Looking for Virtual Love in All the Wrong Places

b2ap3_thumbnail_i_love_you_400_20150209-171815_1.jpgOnline dating has been around long enough that it no longer carries a negative social stigma. In fact, you may know of some success stories from online dating--or you may have even successfully used online dating yourself. When looking for online love, remember to use protection from scammers.

0 Comments

The fastest way to do a customizable screenshot

lightshot-screenshot-toolWe love our toys here at Ferrum - and one of them we'd like to share with you.  It's a screenshot tool called LightShot which is a free app you can download on the internet - http://app.prntscr.com.

0 Comments

3 Ways to Prioritize Fighting Botnets

b2ap3_thumbnail_fight_off_a_botnet_400.jpgThe Internet is infested with threats of all kinds, some of the most annoying are bots. These consist of systems which potentially gather information from a variety of sources. While primarily used by search engines to gather data from websites (these are the good kinds), there are others who may have fallen into the hands of hackers which steal information or send spam.

0 Comments

Half of Your Employees Would Steal from You if Fired

b2ap3_thumbnail_former_employee_theft_400.jpgIn a survey by Cyber-Ark, close to half of employees interviewed admitted that if they were fired tomorrow, they would take with them their former company's proprietary data. This is a shocking revelation considering how much you trust your current staff, maybe even to the point of referring to them as "family." What can you do to protect your business from a former employee with ill intentions?

0 Comments

SIP Trunking for Dummies

SIP-trunk-graphic

The phrase "SIP Trunking" or "SIP Trunks", is increasingly common in the world of telecom. However if you are reading this, you are probably not in the telecom business but would like to know more.

0 Comments

Replace a Cisco IP Phone System - Get an additional 15% Off!

Digium SwitchVox

Summer is here and it's getting hot outside!  Why not get an awesome incentive if you're looking for a new PBX?  Digium has a promotion for you that's just as hot!  Get an additional 15% off when you replace a Cisco IP Phone System!

0 Comments

Formulas and Reactions 101: Microsoft Excel 2013 Edition

b2ap3_thumbnail_microsoft_excel_400.jpgDo you have trouble keeping track of your budget and expenses within your company? It's not your fault - prices change over time, and paperwork can be tedious to go through. By taking advantage of Microsoft Excel's basic mathematical formulas, you can simplify the way that keep track of your business's budget.

0 Comments

Alert: Cryptolocker Threat Returns with a Vengeance!

b2ap3_thumbnail_warning_malware_400.jpgTwo weeks ago, the National Communications Administration managed to weaken a set of malware designed to steal banking and personal credentials from unsuspecting users. They warned the world that GameOver Zeus and Cryptolocker ransomware would be back with a vengeance, and that immediate action could prevent a whole lot of pain later.

0 Comments

Never Lift a Style Guide Again With Microsoft Word’s Built-In Citation Machine

b2ap3_thumbnail_Microsoft-Word-Logo.jpgDespite what many people think, Microsoft Word is far from a normal word processor. Microsoft has thrown all sorts of nifty new toys in there for its consumers to enjoy, such as a built-in citation machine for all of your research needs. When writing a white paper, you want to use specific examples and you want to give others credit when it is due. That's the only professional way to do it.

0 Comments

200 Million People’s Identities Compromised in One Scam

b2ap3_thumbnail_it_security_400.jpgDetails are still coming in regarding one of the biggest data breaches in history that compromised the personal records of 200 million Americans! The scam was propagated by the online ID theft service Superget.info, and it's currently being investigated by the U.S. Senate Committee on Commerce, Science, and Transportation.

0 Comments

There’s No Good Reason to Disable Your Antivirus Software

b2ap3_thumbnail_dont_turn_off_antivirus_400.jpgIt's a nightmare scenario for any business when a computer virus cripples their system. It's even worse when it happens to a company that has invested in a dedicated antivirus software, especially when the virus got through because someone felt the need to disable it! Because of scenarios like this, you should never disable your antivirus software.

0 Comments

Blog Archive

2024
June
July
August
September
October
November
December
2012
January
February
March
April
May
June
July
August
September
October
November
December
2011
January
February
March
April
May
June
July
August
September
October
November
December
2010
January
February
March
April
May
June
July
August
September
October
November
December
2009
January
February
March
April
May
June
July
August
September
October
November
December
2008
January
February
March
April
May
June
July
August
September
October
November
December
2007
January
February
March
April
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code