Seattle (206) 762-5100 || Charleston (843) 990-9200

9 Ways to Spot Email Phishing Scams

What are phishing emails and how much damage can they do to businesses? Phishing emails are a type of scam where criminals send an email that appears to be from a legitimate vendor or client and ask you to provide sensitive information or worse, a payment. According...

Why Do Law Firms Need Managed IT Services

Every law firm has two major challenges. One of them is the storage of the sheer volume of data their business creates and the other one is the protection of that data. The last few decades' worth of technology has created a very solid solution for the first...

Benefits of an MSP for IT Support

Managed Service Providers - or MSPs - are often recommended as a cost effective IT solution for small businesses. For a minimal monthly fee, MSPs provide a reasonably priced solution to the complex technology pains of small businesses. Here’s a look at the various...

Data Connectivity Issues – Causes and Cures

Connectivity between devices and networks is the foundation of a modern logistics. Facilities with data connectivity issues often find themselves in trouble as productivity declines and cost increases. There are many causes of these issues, we try to define several...

5G and Wi-Fi 6: Complementary Technologies for Connectivity in Enterprise

5G and Wi-Fi 6 may seem like competing technologies but nothing could be further from the truth. Where 5G has the edge in providing large scale exterior coverage, it suffers from the same issues as 4G trying to penetrate and cover building interiors. Wi-Fi 6 bridges...

What are my IT guys doing all day?

Many executive think that if they don’t see problems popping up all the time with their IT network, then systems are running well and there are no issues. They wonder "what are my IT guys doing all day?". In reality, actions are being taken behind the scenes to ensure...

Migrating to Office 365

Everywhere you look, you see businesses moving to the cloud. Keywords like Office 365, cloud servers, and cost savings have been floating around as well. We at Responza enjoy consulting with our clients on which products and services suit their needs best. One we...

read more

WannaCry Didn’t Make Us Cry

The negative business impact felt worldwide following the WannaCry ransomware attack reminds us of the importance to be vigilant and use best practices to protect our systems. While 300,000 business systems in over 150 countries were affected, none of Responza’s...

read more

Should You Switch to Mac?

For the last few decades, Mac has become increasingly popular. The biggest game changer for them was when their iPod hit the market in the early 2000's. Today in the business world, you have a healthy mix of PC and Mac users. Each with their own reasons to use either...

read more

UPS Fraud E-mail: How You Can Protect Yourself

It seems like every few months we all get hit with a new fraud e-mail. This month, the senders are posing as UPS. Here at Responza, we ensure that our clients do not fall victim to these scams. We do this through not only monitoring remotely but also staying on top of...

read more

Twitter Scams: See How to Spot Them

Twitter can be a wonderful outlet for catching up with the world. You can peek inside the lives of celebrities as easily as it is to connect with your local businesses. However, not everyone on Twitter is looking to relax, some are out there to scam. We at Responza...

read more

Your Business, Your Tax Deductions, and Your IT

Has your server been chugging along for years without any end in sight? Is your organization overdue for a software refresh? Section 179 of the Federal Tax Code can help. If you’ve been on the fence about investing in new hardware or software for your business, and...

read more

Ransomware – Beware! Be Prepared!

Imagine this scenario: Just as the holiday shopping season approaches, a toy company is navigating a nightmare situation: Its database files have been infected by malware. Online criminals encrypted company files, making them unusable, and demanded a hefty ransom to...

read more

Ghosts Slowing Down Your Computer?

Halloween is on the horizon and there have been numerous reports of spooky PC performance slowdowns out there. We present a tale of our own here. One of our client offices, an architecture firm, began generating numerous tickets that all had to do with slow laptops....

read more

Dropbox Malware

There has been a recent spate of malware coming from what looks like Dropbox.    Emails have been circulating that contain a link appearing to point to a Dropbox location that actually uses a tinyurl.com address. We are sending you this notice in hopes of preventing...

read more

The Basics of Email Security

If you’re anything like us, the go-to method of communication in your office is email. It’s not the best way to communicate, but it’s certainly one of the most widely adopted. Unfortunately, that means it’s one of the easiest places for someone with a nefarious agenda...

read more

A Message Regarding Updates and Patching

If your IT Management Reports show patching scores lower than normal this month, it isn’t because we’re all out fishin’, or that we are still recovering from the Solstice Parade.  It’s because Microsoft Patch Tuesday – one of our favorite days of the month – happened...

read more

Microsoft Word: Formatting a Single Item in a List

One of the frustrating things I've found when working with lists is that any formatting used on one item is automatically carried over to every item on the list. Say you've made a list and you want to draw attention to a single item on that list. How do you do it? Let...

read more

Microsoft Word: Creating Tables

Everyone knows how to cut-and-paste a table from Excel into Word, but did you know you can build that same table - actually, you can build a much more elegant one - in Word 2016? So now, instead of switching back and forth from an Excel spreadsheet and a Word...

read more