Blog
  • Register

Subscribe to our blog

CTN Blog

CTN Solutions has been serving the greater Philadelphia area since 1997, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Business Improvement Resolutions

Tip of the Week: Business Improvement Resolutions

A full week into the new year, have you resolved to make any improvements to your business? In light of all the resolutions that may (or may not) have been broken by now, we decided to share a few resolutions you could put into place to improve your business and its processes.

0 Comments
0 Comments
Continue reading

During the Holidays, Cybersecurity Matters at Work and Home

During the Holidays, Cybersecurity Matters at Work and Home

We’re right in the thick of the holiday season, which means two things: one, there’s a lot of data being exchanged between businesses and consumers, and, on a related note, two: there’s ample opportunities for cybercrime, targeting business and consumer both. Whichever side of the coin you are on at any moment, you need to be aware of the risks, and how to mitigate them.

0 Comments
0 Comments
Continue reading

Technology Plays a Part in Shaping How We Celebrate the Season

Technology Plays a Part in Shaping How We Celebrate the Season

The holiday season has always been one of deep-seated traditions, some that draw from ancient customs, and some that are inspired by more contemporary trends. These traditions have been shaped, and often inspired by, the technology available in the day. Today, we’ll reflect on how the technologies we have now have impacted our celebratory traditions.

0 Comments
0 Comments
Continue reading

Are You Accidentally Gifting a Security Breach?

Are You Accidentally Gifting a Security Breach?

The holidays are filled with good food, family time, friend visits, and exchanging gifts. However, to keep the season bright and merry, be cautious during your next gift exchange, as many gifts can present some unexpected risks to your recipient’s security. Be mindful if you see the following items on someone’s wish list.

0 Comments
0 Comments
Continue reading

Thieves Materialize Most Around the Holidays

Thieves Materialize Most Around the Holidays

In terms of identity theft, data loss and good ol’ fashioned pickpocketing, the holiday season is one of the riskiest times to travel. When it comes to protecting your personal information, thieves and cybercriminals are counting on you to be distracted and make careless mistakes. In 2016, the number of fraud attempts went up by 31% during the holiday season. In addition, credit cards, mobile devices, and open Wi-Fi are common targets throughout the holidays.

0 Comments
0 Comments
Continue reading

A Trap So Devious that Even Admiral Ackbar Missed It

b2ap3_thumbnail_may_the_4th_death_star_400.jpgWith the long-awaited release of Star Wars: Episode VII The Force Awakens this December, today’s Star Wars Day holiday may be the biggest yet (May the 4th be with you). As a technology-loving IT company, we’re happy to honor our favorite science fiction franchise by taking a fun look at its futuristic space technology.

0 Comments
0 Comments
Continue reading

Unsent IE Error Reports Uncovered, You Won’t Believe Where!

b2ap3_thumbnail_old_ie_error_reports_400.jpgEven if you like Internet Explorer, you may have noticed that it can be a bit buggy at times. Perhaps if Microsoft had more information about the causes of its software issues, they could develop a better product. This is the purpose of software error reports, which largely go unsent and unread; or at least, that’s what Microsoft thought.

0 Comments
0 Comments
Continue reading

Mark Your Calendars, Folks: World Backup Day is March 31st

b2ap3_thumbnail_world_backup_day_400.jpg2015 isn’t the year to go without backups. If there’s anything 2014 showed the world, it’s that businesses can fall victim to data breaches when they least expect it. You want to be prepared in the event of a data breach or data loss, and the easiest way to do that is by taking advantage of an external backup. Unfortunately, even an essential solution like data backup can be forgotten amidst the everyday operations of the average business owner.

0 Comments
0 Comments
Continue reading

IT Techie, Hurry Up My Downloads Tonight

b2ap3_thumbnail_hurry_up_downloads_400.jpgAn IT parody song to the tune of “Santa Baby.”

0 Comments
0 Comments
Continue reading

The PC on Haunted Hill

b2ap3_thumbnail_pc_on_haunted_hill_400.jpgOur minds often attribute unexplained phenomena with hauntings from ghosts. Most of the time, there's a perfectly good scientific explanation for what's going on. If you ever see your computer's cursor move on its own, your PC isn't haunted. Although, you might prefer a haunting to what's really happening; a hacker is probably stealing your data. Now that's scary!

0 Comments
0 Comments
Continue reading

Mobile? Grab this Article!

QR Code

Latest News & Events

CTN has been named to the 2020 Managed Services (MSP) 500 list of accomplished IT providers in North America by CRN and The Channel Company. This popular list identifies North American solution providers that deliver operational efficiencie...

Latest Blog

Did you know that, as of July 2020, 69 percent of global desktop Internet users chose Google Chrome as their browser? With such a large market share, the security associated with Google Chrome is important to keep in mind. To help increase ...

Contact Us

Learn more about what CTN can do for your business.

Call us today
(610) 828-5500

610 Sentry Parkway
Suite 110
Blue Bell, Pennsylvania 19422