C2IT Blog
News, Resources & Links
Welcome to our blog. This is a place where we share our thoughts as well as links to great articles we hope you’ll find useful.
If you’d like to see us write about something specific, please feel free to fill out our contact form. Select Blog Suggestion from the dropdown menu.
Take Care of Your Cookies
Last month I shared about the good, the bad, and the ugly of Internet cookies. Cookies are great when they help you stay logged onto a website you frequently visit, but their value gets a little murkier when things you searched for on a website start showing up in...
Finding Fun in the Fray
One would rightly assume that working as a part of a successful IT company like C2IT comes with its share of pressures and deadlines. Between the support tickets, emails, web updates, security patches, and new business opportunities, there is always something to do or...
7 Pro Tips for Microsoft 365
Microsoft 365 is the most popular of all major office productivity software. It has 48.8% of the global market share, just edging out Google’s apps, by a couple of percentage points. It’s used by individuals, small & mid-sized businesses, and larger enterprise...
Helpful Tips For Keeping Your Shared Cloud Storage Organized
Cloud file storage revolutionized the way we handle documents. No more having to email files back and forth. No more wondering which person in the office has the most recent copy of a document. Between 2015 and 2022, the percentage of worldwide corporate data stored...
Let The Good Times Roll
Productivity, achievement, priority management, goal-setting, and measurables. Words like these appear in every business journal and countless LinkedIn posts. These words represent important aspects of every business and can help keep the mission moving forward. But a...
6 Discontinued Technology Tools You Should Not Be Using Any Longer
One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete. Discontinued technology can leave computers and networks vulnerable to attacks. While...
6 Important IT Policies Any Size Company Should Implement
Many small businesses make the mistake of skipping policies. They feel that things don’t need to be so formal. They’ll just tell staff what’s expected when it comes up and think that’s good enough. But this way of thinking can cause issues for small and mid-sized...
Get More Unplugged Laptop Time with These Battery-Saving Hacks
One of the big draws of a laptop computer is that you can use it anywhere. You don’t need to have it plugged in all the time because it has an internal battery. Your laptop may start out with several hours of battery life when you first buy it. But the lifespan can...
A Beautiful Friendship – Guilford Township
Plainfield is a wonderful community, and Guilford Township is one of the gorgeous cornerstones that help make Plainfield great. The incomparable Hummel Park with its trails, lakes, summer concerts, and community events is the pride of the township. In 2018, Guilford...
5 Exciting Ways Microsoft 365 Can Enable the Hybrid Office
These benefits of remote teams included cost savings for both workers and employers. It also allowed the company to operate with more flexibility. Improved worker morale was another advantage. One fact surprised many employers that feared remote work would tank...
Rain doesn’t dampen the fun at Chamber Golf Outing
Storms rolled through the area on August 4th, threatening to make the Plainfield Chamber of Commerce Golf Outing a washout. Despite the ugly start, dozens of teams and over a hundred golfers enjoyed a great day at Deer Creek Golf Club. The C2IT Team was out in full...
Home Security: Why You Should Put IoT Devices on a Guest Wi-Fi Network
The number of internet-connected devices in homes has been growing. It's increased exponentially over the last decade. A typical home now has 10.37 devices connected to the internet. PCs and mobile devices make up a little over half of those and the rest are IoT...
The Good, the Bad, and the Ugly of Cookies
“By continuing to use this site, you agree to allow us to use cookies to store, access, and process personal data as you visit our website.” Let’s be honest. When most of us visit a new website and are greeted with a message like this, we just click through and...
How Using the SLAM Method Can Improve Phishing Detection
There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing...
Did You Just Receive a Text from Yourself? Learn What Smishing Scams to Expect
How many text messages from companies do you receive today as compared to about two years ago? If you’re like many people, it’s quite a few more. This is because retailers have begun bypassing bloated email inboxes. They are urging consumers to sign up for SMS alerts...
Now Hiring – Network & Cybersecurity Tech / Helpdesk Support Tech
C2IT Consulting, Inc. (“C2IT”) is a central Indiana-based technology firm with over 20 years of experience in helping organizations achieve more with tech. C2IT designs, builds, and supports data-driven mobile apps, websites, and technology solutions. We increase...
How Often Do You Need to Train Employees on Cybersecurity Awareness?
You’ve completed your annual phishing training. This includes teaching employees how to spot phishing emails. You’re feeling good about it. That is until about 5-6 months later. Your company suffers a costly ransomware infection due to a click on a phishing link. You...
Which Form of MFA Is the Most Secure? Which Is the Most Convenient?
Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With data and business processes now largely cloud-based, a user’s password is the quickest and easiest way to conduct many different types of...
Top 5 Mobile Device Attacks You Need to Watch Out For
Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They’re more portable and can be used from anywhere. We’re seeing the takeover of many activities that used to be performed on traditional...
Now Hiring – Project Coordinator
C2IT Consulting, Inc. (“C2IT”) is an Indianapolis based technology firm with over 20 years experience in helping organizations achieve more with tech. C2IT designs, builds, and supports data-driven mobile apps, websites, and software solutions. We increase efficiency...
Signs That Your Computer May Be Infected with Malware
Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: Viruses Ransomware Spyware Trojans...
Pros & Cons of Using the Windows 365 Cloud PC
While many companies have moved most of their workflows to the cloud, there is still a key component of office operations that is location-based. This would be employee computers. Most companies still rely on desktops and laptops to allow employees to access critical...
Are Two Monitors Really More Productive Than One?
When you see those people with two monitors, you may assume they do some specialized work that requires all that screen space, or they just really like technology. But having the additional display real estate that a second screen provides can benefit anyone, even if...
What Are the Best Ways to Give an Older PC New Life?
Purchasing a new computer is a big investment. Many small businesses and home PC owners end up struggling with older systems because they want to get as many years out of them as possible. Have you found yourself banging on your keyboard in frustration? Have you tried...