Tech Support Done Right Blog

Tech Support Done Right has been serving the Maryland area since 2018, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

  • All Articles
  • Best practices
  • blog
  • Business
  • Cloud
  • How to
  • Miscellaneous
  • Resources
  • Security
  • Technology
  • Tip of the Week

Seven Ways to Maximize Cloud Solutions for Your Small Business

Cloud computing has been front and centre of the global shift to remote working. Find out how you can maximize this technology…

Podcast: IoT Piranhas Are Swarming Industrial Controls

Enormous botnets of IoT devices are going after decades-old legacy systems that are rife in systems that control crucial infrastructure. Babuk Ransomware…

Babuk Ransomware Gang Ransomed, New Forum Stuffed With Porn

A comment spammer flooded Babuk’s new ransomware forum with gay orgy porn GIFs and demanded $5K in bitcoin. Microsoft Rushes Fix for…

Microsoft Rushes Fix for ‘PetitPotam’ Attack PoC

Microsoft releases mitigations for a Windows NT LAN Manager exploit that forces remote Windows systems to reveal password hashes that can be…

Malware Makers Using ‘Exotic’ Programming Languages

Sprechen Sie Rust? Polyglot malware authors are increasingly using obscure programming languages to evade detection. The True Impact of Ransomware Attacks

The True Impact of Ransomware Attacks

Keeper’s research reveals that in addition to knocking systems offline, ransomware attacks degrade productivity, cause organizations to incur significant indirect costs, and…

Discord CDN and API Abuses Drive Wave of Malware Detections

Targets of Discord malware expand far beyond gamers. 5 Steps to Improving Ransomware Resiliency

5 Steps to Improving Ransomware Resiliency

Alex Restrepo, cybersecurity researcher at Veritas, lays out the key concepts that organizations should be paying attention to now and implementing today….

FIN7’s Liquor Lure Compromises Law Firm with Backdoor

Using a lure relating to a lawsuit against the owner of Jack Daniels whiskey, the cybergang launched a campaign that may be…

Kaseya Obtains Universal Decryptor for REvil Ransomware

The vendor will work with customers affected by the early July spate of ransomware attacks to unlock files; it’s unclear if the…

FBI: Cybercriminals Eyeing Broadcast Disruption at Tokyo Olympics

Expected cyberattacks on Tokyo Olympics likely include attempts to hijack video feeds, the Feds warn. Protecting Your Mobile Device Against Guests

Tip of the Week: Protecting Your Mobile Device Against Guests

Most modern businesses are using information systems to accelerate their profitability. In fact, small and medium-sized businesses are expected to spend over…

Tip of the Week: Protecting Your Mobile Device Against Guests

Let’s face facts: there could easily be quite a bit on your mobile device that you don’t want someone to have access…

Accounting Firms are Counting on Their IT

We’re right in the middle of tax season and accountants are having to manage potential attacks on their data. Since people depend…

Choosing the Right Software Is Essential for Today’s Businesses

Most businesses rely on specific software, and a lot of it. It’s used to manage, protect, and facilitate your business. Today’s software…

Tip of the Week: Activating Clicklock on a Laptop

Laptops are pretty great. They’re powerful, yet portable computers that can be brought effectively anywhere work needs to be done. That being…

How Important is Socialization Between Your Remote Team Members?

Remote work is a more popular option than ever, considering how businesses have needed to adapt, but that isn’t to say that…

How to Optimize Your Technology Budget in 2021

After 2020, it is understandable that many businesses would be seeking out a way to recoup a lot of the expenses and…

Tip of the Week: Deciphering Your Computer’s Power Options

Granted, you’re probably most interested in your computer when you’re using it. However, it is very important to consider what you do…

Scale Your IT to Better Manage Your Budget

Today’s business has to do more with less. This goes for all of its resources including the technology it uses. Runaway IT…

If Your Backup Doesn’t Involve These Three Aspects, You’re Doing It Wrong

For any business continuity strategy to be complete, a data backup strategy needs to be involved. This is often easier said than…

Tip of the Week: How to Generate Strong Passwords That You Can Actually Remember

Passwords are effectively the cornerstone of your business’ data security—if they aren’t up to muster, your protections could crumble. Unfortunately, many users…

What’s Happening with COVID-19 Scams

During the COVID-19 pandemic there have been quite a few different types of scams. At first, most of the scams centered around…

Is Your IT Infrastructure Fully Documented and Tracked?

When reviewing their inventory, many businesses forget to consider one of their most used, most important resources: their technology. Let’s go over…

Tip of the Week: Properly Preparing to Respond to a Data Breach

While nobody wants their company to suffer a data breach, the nature of today’s workplace makes these occurrences harder and harder to…

These 3 Considerations Can Help Your IT Decision Making

When your business is in the position to add new technology, the process can be pretty confusing. You try to make good…

Why Online Speech Isn’t (Usually) a Free Speech Issue

It is undeniable that technology has become ingrained into our workplaces, and perhaps even more so into our daily lives—particularly considering the…

Optimizing Images for the Web 101 – Resizing Your Images

It wasn’t long ago that we took the time to discuss what format is best while you’re sharing images, whether via email…

Optimizing Images for the Web 101 – Image File Formats

Images are immensely useful tools to communicate, whether using them online or sharing them in an email. Having said that, understanding a…

How to Prepare Your Team to Fight Phishing

While last year saw a significant decrease in its number of data breaches, the number of records that were leaked doubled… and…

Tip of the Week: Three Questions to Help Arrange Your Priorities

The typical workday is filled with tasks—oftentimes, more than can be handled in the span of a day and all given the…

The Lego Group Is Using IT the Right Way

Regardless of a business’ size, technology can help it to resolve most operational challenges it is contending with. For instance, global toy…

How to Determine Which Productivity Suite to Use

Many businesses have turned to the productivity suite as they’ve added more and more useful tools. Traditionally, the productivity suite came with…

Changing Technology Strategies Isn’t Always Great for Businesses

For businesses that are looking to make large shifts in their operational strategies by adding new technology, they may be looking at…

3 Employee-Related Threats and What To Do to Stop Them

I think most business owners would be kind of surprised to find out that the biggest threat to their business wasn’t hackers…

Tip of the Week: Embedding a Video into a PowerPoint Presentation

Microsoft PowerPoint is an extremely effective visual tool for helping to get a message across. Oftentimes, however, a video clip can be…

Shifts In Strategy Keep Businesses Moving Along

The past year has been tough on many businesses. If they’ve learned anything it is the importance of staying flexible. The COVID-19…

Why (and How) SMBs Should Strategically Adopt Technology

There is no question that a small business can benefit from technology, as has been proven time and time again. However, an…

Is Your Cloud Solution Actually a Money Pit?

The cloud has proven to be an extremely useful tool for the modern business. Not only does it provide anywhere-anytime access to…

How to Avoid Becoming the Next Data Security Cautionary Tale

Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are…

4 Ways a Managed Service Provider Can Help Your Business

How much does your business rely on technology to keep your organization running forward? As business technology becomes more complex, it’s becoming…

Knowing, and Planning For, Your Organization’s Compliance Burden

Despite what detractors say, regulations are in place for good reason. They typically protect individuals from organizational malfeasance. Many of these regulations…

A Look at Business Computing Costs: Cloud vs. On Premise

Profitability is less the measure of being able to turn a profit, and more the measure of how much profit you can…

Is Data a Commodity? Maybe Not, but It Is an Asset

The late American author Kurt Vonnegut once wrote, “New knowledge is the most valuable commodity on earth. The more truth we have…