Blog
  • Register

Subscribe to our blog

CTN Blog

CTN Solutions has been serving the greater Philadelphia area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Recovering Lost or Corrupt Microsoft Office Files

b2ap3_thumbnail_ms_office_logo_400.jpgIf your business were to lose important files due to an unexpected Microsoft Office crash or hardware failure, what would you do? Losing files can be difficult to recover from, especially if you aren’t using a cloud service which saves automatically after every edit. Lost files don’t benefit anyone, and if they are important, it could even put your business at risk. But don’t worry; there’s a way to recover lost Office files if things turn sour.

0 Comments
0 Comments
Continue reading

Caution: Enhanced Cryptowall Ransomware Threatens Networks

b2ap3_thumbnail_cryptowall_2_0_400.jpgAs a business owner, you have an obligation to keep your data and network files safe from prying eyes and criminals. The latest threats, like the new Cryptowall 2.0 ransomware, can be a difficult hurdle to jump, especially when they are disguised and designed to ruin you. Thankfully, you don’t have to take on these threats alone.

0 Comments
0 Comments
Continue reading

Sandworm: Russian Cyber Espionage Campaign Uncovered After 5 Years

b2ap3_thumbnail_sandworms_400.jpgA new threat, dubbed Sandworm by iSight Partners, has been discovered. It is a cyber espionage campaign dating back to at least 2009, and is said to be based in Russia. Sandworm uses a previously undiscovered zero-day vulnerability in Windows operating systems to steal information from government leaders and organizations.

0 Comments
0 Comments
Continue reading

Tip of the Week: 13 Shortcuts for Microsoft Outlook

b2ap3_thumbnail_outlook_1_400.jpgMicrosoft Outlook is a great tool for the everyday businessman, but it can be tricky to use sometimes. Just like Microsoft Word, there are several shortcuts that you can utilize to boost your productivity and reduce the amount of time you spend fumbling around the variety of different options available to you.

0 Comments
0 Comments
Continue reading

“Zero Trust” Network Security: Only Trust Data as Far as You Can Throw It!

b2ap3_thumbnail_zero_trust_400.jpgWhen it feels like everybody is out to get you, there's only one way to survive: Trust nobody. You may not have too many physical enemies ready to jump you, but there's an army of hackers wanting to breach your company's database. One of the securest ways to keep your company's information safe is to implement a "zero trust" network security model.

0 Comments
0 Comments
Continue reading

Apple’s iPhone 6 and iPhone 6+ Bend Expectations

b2ap3_thumbnail_iphone_6_and_6_plus_400.jpgApple is back with another iPhone! The Silicon Valley-based hardware and software manufacturer has released the new versions of their extremely popular iPhone series of devices. The two-headed approach that Apple took with their second incantation of the iPhone 5 (the 5s and 5c), is replicated this time out as well. After being surpassed by Samsung over the past two years, does the iPhone 6 and its larger version, the iPhone 6+, have what it takes to get Apple back on top?

0 Comments
0 Comments
Continue reading

Malware, Viruses, Adware, and Spyware. What’s the Difference?

b2ap3_thumbnail_malware_information.jpgTechnically the difference between malware and a virus is merely linguistic. Viruses, adware, and spyware are all examples of different types of malicious software that are referred to as malware. It describes a specific type of software code that is meant to infect a computer, tablet, or mobile device with a third party software. Malware changes the behavior of the device to make it perform actions without the users control or consent such as to steal passwords, send spam emails, or track keystrokes.

0 Comments
0 Comments
Continue reading

3 Benefits Virtual Servers Bring to Your Business

b2ap3_thumbnail_virtual_server_400.jpgVirtualization is all the rage in the technology world. In fact, virtual servers are practically omnipresent in modern workplaces. Why? Because they offer businesses unprecedented opportunity for growth and development. The benefits of virtualized servers far outweigh the costs, aiding businesses in expanding their goals and visions for the future.

0 Comments
0 Comments
Continue reading

Herding Cats is Harder Than it Looks [VIDEO]

b2ap3_thumbnail_cats_cats_cats_400.jpgHerding cats is a business term used to describe the task of organizing and controlling entities like people and systems known for being uncontrollable and even chaotic. Due to the unpredictable and independent nature of felines, cat herding captures the idea of controlled chaos perfectly. Does running your business feel like you're working on a cat ranch?

0 Comments
0 Comments
Continue reading

Tip of the Week: How to Find the Perfect VoIP Plan for Your Business

b2ap3_thumbnail_voip_for_you_400.jpgIf your business has a reliable and high-speed Internet connection, then you’ve got what it takes to experience significant savings by switching your company’s phone system to VoIP (Voice over Internet Protocol). Once you’ve decided to make the switch, you will next have to select a VoIP solution that’s right for your organization. Here are some tips to help you make this important decision.

0 Comments
0 Comments
Continue reading

The End of an Era: the Harkonnen Hacking Operation is Over

b2ap3_thumbnail_harkonnen_hackers_400.jpgFor the past 12 years, the Harkonnen Operation has plagued Europe. The malware campaign, operating scams in Germany, Switzerland, and Austria since 2002, has finally ended, but that doesn't change the fact that it may be the most long-lived malware to have existed. What kept security firms from discovering these attacks and preventing them for so long?

0 Comments
0 Comments
Continue reading

au·dit/ noun/: a systematic review or assessment of something

b2ap3_thumbnail_it_audit_400.jpgAre you confident that your company's network is 100 percent secure? The best way to answer "yes" to this question is with a network audit. This is a technical procedure where IT professionals analyze every nook and cranny of your system, looking for every possible vulnerability. No matter what the situation is with your company's IT management, a network audit is worth doing.

0 Comments
0 Comments
Continue reading

As the Facebook Empire Grows, the Acquisitions Keep Coming

b2ap3_thumbnail_facebook_is_buying_400.jpgIt's no secret that Facebook is one of the most visited sites on the Internet. In fact, according to the Alexa rankings, which measure website traffic, facebook.com is ranked second after only Google.com. With this much exposure, and the emanated revenue that comes from this kind of traffic, it has become important for the world's largest and most successful social network to scout out and eliminate possible competitors, many times before those companies even consider themselves potential competitors.

0 Comments
0 Comments
Continue reading

Save $11,000 Annually for Each Telecommuting Employee

b2ap3_thumbnail_tellecommuting_is_best_400.jpgA lot of employers are nervous about letting their employees work from home, but due to the increased evidence that it can be beneficial to productivity and cost-efficiency, it's getting more and more difficult to avoid thinking about it. In fact, according to Global Workplace Analytics, working from home has grown a whopping 80 percent in the United States since 2005.

0 Comments
0 Comments
Continue reading

Tip of the Week: How to Clean your Laptop

b2ap3_thumbnail_clean_laptop_400.jpgThis is our first article in a series of helpful technology tips that we will publish every week. For more great tips, check out our previous blog articles. This week, we're walking you through the proper way to clean your laptop.

0 Comments
0 Comments
Continue reading

3 Big Data Solutions for Modern Businesses

b2ap3_thumbnail_big_data_help_400.jpgBig Data is an important part of any business. Without understanding trends in the consumer populace, how can you hope to sell your product? Unfortunately, many companies don't know how to handle big data, and this holds back their earning potential significantly.

0 Comments
0 Comments
Continue reading

How Safe is Your Email?

 

Spam protectionEmail is (and has been) a prime method of communication for businesses of all sizes. With email comes a whole slew of issues that are essentially synonymous with the technology; spam, information overload, phishing, and information privacy. Even Greater Philadelphia Area small businesses that only do business locally are at risk of these issues. Personal email accounts are equally at risk. Employing proper precautions and practices whenever communicating via email is very important to prevent the risk of security compromises, monetary loss, and even legality issues.

0 Comments
0 Comments
Continue reading

Slow Computer? Increase your memory to boost computer Speeds

guy sleeping at computerSometimes when your workstation feels bogged down, a relatively cheap and simply hardware update can make a huge difference in performance. Adding more RAM (Random Access Memory, often just referred to as memory) can be a game changer for your bogged down PC.

0 Comments
0 Comments
Continue reading

What is your Identity Worth to You?

man with no identityYour identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let's talk about a few of these statistics and what it means.

0 Comments
0 Comments
Continue reading

Disaster Recovery and Why it Matters to Greater Philadelphia Area Businesses

Disaster recovery life saverWhen you mention the term 'disaster recovery,' most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller things can constitute as a disaster for your business, and they aren't seasonal.

0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN Solutions welcomes Richard McSweeney to the Executive Management team.As IT Practice Director, Rich will be running the CTN IT Staffing Services business unit. IT Staffing Services provides IT consultants and services to supplement its ...

Latest Blog

There quite a few reasons that it makes sense for a small-to-medium-sized business to lean on outsourced assets. Let’s go over a few of the biggest benefits that you could see from bringing on these kinds of services, from both a financial ...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422