Technical Edge Consulting Blog

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_browser_tab_green400.jpgEveryone has accidentally closed an important web browser tab before they were finished with it. What can you really do about it, though? You might expect that you have to search for the page again, but there’s a much easier way to do it. In your Google Chrome browser on a PC or smartphone, you can reopen closed tabs relatively easily.

b2ap3_thumbnail_circut_face_darkoverlord400.jpgStudents generally love it when classes are cancelled for whatever reason, but thanks to a cybercriminal group called TheDarkOverlord Solutions, a school in Flathead Valley, Montana was disrupted for an extended period of time. This downtime resulted in a disruption of operations for over 30 schools, as well as the threat to the personal information of countless teachers, students, and administrators due to a ransomware attack.

b2ap3_thumbnail_data_breach_defined400.jpgConsidering that since January 1st of this year, there has been upwards of 10 million personal information records lost or stolen each day, odds are that you, or someone you know, has had their records compromised by a data breach. With such a high incident rate, individuals and businesses that have never received any kind of notification that their records were included in a breach, generally consider themselves lucky and assume that they are not at risk of identity theft or unauthorized account usage. Unfortunately for them, that is not always the case.

b2ap3_thumbnail_Wordlogo400.jpgMicrosoft Word has long since established itself as the primary word processing software in the business world, but even some power users don’t necessarily know about all of the hidden features that exist in it. Here are three of the best Word capabilities that you’ll be sure to use next time you’re in a pinch.

b2ap3_thumbnail_digital_granade400.jpgIf you run a small business, you might consider yourself a small target of hacking attacks. It might make sense to think of it in this way, but this actually is not advisable to think of it in this way. According to a recent survey by CNBC and SurveyMonkey, only two percent of small businesses see cyber attacks as anything worth worrying about. This leads us to the next question… are you one of them?

Latest Blog Entry

Should Companies Be Punished for Data Breaches?
We’ve all seen and heard about companies and government departments that have experienced major security and data loss events. Once the event is made public, there is a media frenzy of coverage discl...
Continue Reading...

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Technical Edge Consulting!

Read more...

Contact Us

Learn more about what Technical Edge Consulting can do for your business.

callphone

Call us today    406.896.0498

5710 Interstate Avenue
Suite #5
Billings, Montana 59101

Click to Call Us!! facebook twitter linkedin #